General

  • Target

    ba0ebaa558648fab49afea0c1fdeeb2e_JaffaCakes118

  • Size

    3KB

  • Sample

    240823-c8mpdatemq

  • MD5

    ba0ebaa558648fab49afea0c1fdeeb2e

  • SHA1

    1ec2b3e38e24c1af1ca25f3aebb0e863fc6bb1fa

  • SHA256

    625441cf7686b54e82938d6167a50b06f11f86e78679e27645f2722e64efc875

  • SHA512

    835dbcd5cb65cd3e91c7df1b27e0bf88aaa4ede1fe886f9f420e9d7214419e7701f828066070f9cba7a93053e192bbb3ed5396bc6087675ba059d84a12a9e593

Malware Config

Targets

    • Target

      ba0ebaa558648fab49afea0c1fdeeb2e_JaffaCakes118

    • Size

      3KB

    • MD5

      ba0ebaa558648fab49afea0c1fdeeb2e

    • SHA1

      1ec2b3e38e24c1af1ca25f3aebb0e863fc6bb1fa

    • SHA256

      625441cf7686b54e82938d6167a50b06f11f86e78679e27645f2722e64efc875

    • SHA512

      835dbcd5cb65cd3e91c7df1b27e0bf88aaa4ede1fe886f9f420e9d7214419e7701f828066070f9cba7a93053e192bbb3ed5396bc6087675ba059d84a12a9e593

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

MITRE ATT&CK Enterprise v15

Tasks