General

  • Target

    b714415559a26cc29d5d8e657a201e52_JaffaCakes118

  • Size

    92KB

  • Sample

    240822-k4gxbs1hmp

  • MD5

    b714415559a26cc29d5d8e657a201e52

  • SHA1

    eed7d15353a852f9c6d1c3ba370b226ac59c660f

  • SHA256

    53be885e3b29f88718693ccf0042cb207f2493e18b1f002be7e72ee65fdb11ec

  • SHA512

    06e793bdf1226b925dd9162978bd6a6c8258008637a882e1a5e86eef713a4ee00cf7bff989754ed6cac7fbd2201e96b2f0b13636b32a743b5256909c8867babc

  • SSDEEP

    1536:iixVEFHY1bBBunuRxmETYX1LzjwiGHypxMW+bVBZrYV0oIe:3MuuK9TMYL2UVB60oI

Malware Config

Targets

    • Target

      b714415559a26cc29d5d8e657a201e52_JaffaCakes118

    • Size

      92KB

    • MD5

      b714415559a26cc29d5d8e657a201e52

    • SHA1

      eed7d15353a852f9c6d1c3ba370b226ac59c660f

    • SHA256

      53be885e3b29f88718693ccf0042cb207f2493e18b1f002be7e72ee65fdb11ec

    • SHA512

      06e793bdf1226b925dd9162978bd6a6c8258008637a882e1a5e86eef713a4ee00cf7bff989754ed6cac7fbd2201e96b2f0b13636b32a743b5256909c8867babc

    • SSDEEP

      1536:iixVEFHY1bBBunuRxmETYX1LzjwiGHypxMW+bVBZrYV0oIe:3MuuK9TMYL2UVB60oI

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks