General

  • Target

    ba5d912419fef1779636bc28e809ddb1_JaffaCakes118

  • Size

    28KB

  • Sample

    240823-e4jg9sxfrn

  • MD5

    ba5d912419fef1779636bc28e809ddb1

  • SHA1

    a80c8f637949739a3e72ed68bbad4ce0838e02fa

  • SHA256

    15359651f622c8b4925d81fe0b0458a79090b0303e99ffdb8aad91c4ea59cc7f

  • SHA512

    63124bc67e70375d31c2b23de404d30d70fd2250da43bf2cf7c713b2c4acea1f180cb23ca05f8f50018e0ae367424a3e15b4d38eb3cbc41201e45152813c9019

  • SSDEEP

    384:oYegtXqRlt11bqicUcB70UlUFiqzGrXTdHzcpSv3AXbIylN7AfNiFKyVJ/r0FiRy:ogtXs1VY30iq6rDOpSvWMeQFDO6

Malware Config

Targets

    • Target

      ba5d912419fef1779636bc28e809ddb1_JaffaCakes118

    • Size

      28KB

    • MD5

      ba5d912419fef1779636bc28e809ddb1

    • SHA1

      a80c8f637949739a3e72ed68bbad4ce0838e02fa

    • SHA256

      15359651f622c8b4925d81fe0b0458a79090b0303e99ffdb8aad91c4ea59cc7f

    • SHA512

      63124bc67e70375d31c2b23de404d30d70fd2250da43bf2cf7c713b2c4acea1f180cb23ca05f8f50018e0ae367424a3e15b4d38eb3cbc41201e45152813c9019

    • SSDEEP

      384:oYegtXqRlt11bqicUcB70UlUFiqzGrXTdHzcpSv3AXbIylN7AfNiFKyVJ/r0FiRy:ogtXs1VY30iq6rDOpSvWMeQFDO6

    • Boot or Logon Autostart Execution: Print Processors

      Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks