General

  • Target

    b04df15f2f86482a915455351223a071_JaffaCakes118

  • Size

    92KB

  • Sample

    240820-wvq97awerd

  • MD5

    b04df15f2f86482a915455351223a071

  • SHA1

    ab5fb2e20e694dc7d4ad4cee7c8366a096d3b8cc

  • SHA256

    da42480623273f2348114cd3de60b57f84775b615a326c7e81555a6f8e9fe839

  • SHA512

    ec409226f4de9d80108738ba37775174b051a9ff75542c3938911beec584d2d782937b4737022d24da881ec541e9736eac1f55fe59cd63bd9e05c08d6ca0da6a

  • SSDEEP

    1536:+BzilpygERH65HIREcr562K7F59ft5jg94BroxMWNLzMo:lygERH65oRZQT7tjg4ExxlzMo

Malware Config

Targets

    • Target

      b04df15f2f86482a915455351223a071_JaffaCakes118

    • Size

      92KB

    • MD5

      b04df15f2f86482a915455351223a071

    • SHA1

      ab5fb2e20e694dc7d4ad4cee7c8366a096d3b8cc

    • SHA256

      da42480623273f2348114cd3de60b57f84775b615a326c7e81555a6f8e9fe839

    • SHA512

      ec409226f4de9d80108738ba37775174b051a9ff75542c3938911beec584d2d782937b4737022d24da881ec541e9736eac1f55fe59cd63bd9e05c08d6ca0da6a

    • SSDEEP

      1536:+BzilpygERH65HIREcr562K7F59ft5jg94BroxMWNLzMo:lygERH65oRZQT7tjg4ExxlzMo

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks