General

  • Target

    af8278d39923ace31c8cbc6d5e24bec6_JaffaCakes118

  • Size

    36KB

  • Sample

    240820-rcxl2awajg

  • MD5

    af8278d39923ace31c8cbc6d5e24bec6

  • SHA1

    e815fe2c70670234f729af38d1ec5b6dc99cf426

  • SHA256

    0e1961319c977d43011c8cd006e61908a180b0db705bc9e33a38857b8afdcfb0

  • SHA512

    ca17850c3489ddd230cf25f5e633ce3ef96b3a0e6b4fc3b684f1ed8670d9efc3a2a7b25b16bc7556157bcf04b876ce0dfae567bc1f1a0ce94be05e15cee15237

  • SSDEEP

    768:zfZ2YidJN5kXcyXrCD1tDMByGqnxGm3+IdW:zedEcyXrC/GsnsGdW

Malware Config

Targets

    • Target

      af8278d39923ace31c8cbc6d5e24bec6_JaffaCakes118

    • Size

      36KB

    • MD5

      af8278d39923ace31c8cbc6d5e24bec6

    • SHA1

      e815fe2c70670234f729af38d1ec5b6dc99cf426

    • SHA256

      0e1961319c977d43011c8cd006e61908a180b0db705bc9e33a38857b8afdcfb0

    • SHA512

      ca17850c3489ddd230cf25f5e633ce3ef96b3a0e6b4fc3b684f1ed8670d9efc3a2a7b25b16bc7556157bcf04b876ce0dfae567bc1f1a0ce94be05e15cee15237

    • SSDEEP

      768:zfZ2YidJN5kXcyXrCD1tDMByGqnxGm3+IdW:zedEcyXrC/GsnsGdW

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks