General

  • Target

    bc5ab149e2527a1007286446bf1117e0_JaffaCakes118

  • Size

    65KB

  • Sample

    240823-s5m4qsvhmk

  • MD5

    bc5ab149e2527a1007286446bf1117e0

  • SHA1

    656334d1743f4e816dd194f97739ce48b95758b8

  • SHA256

    38252aa50884d666b9fd7f31d5967e540f4682b676a5870d4375c49861e6d460

  • SHA512

    55a377767a6b4fc5663f668b7993de8ef83077302b8fa4a74b02f1fff6168f60d5e38e4c5b9dea4eae9a20e13910be00d58a5e4efda4a3a72133730424e294ad

  • SSDEEP

    1536:Bt0R7qPjNebZHSOMqTFrjgSt4lW5wGyPwBH50Py7I:m7q5ebZ3Mqt1wzGyoAy7

Malware Config

Targets

    • Target

      bc5ab149e2527a1007286446bf1117e0_JaffaCakes118

    • Size

      65KB

    • MD5

      bc5ab149e2527a1007286446bf1117e0

    • SHA1

      656334d1743f4e816dd194f97739ce48b95758b8

    • SHA256

      38252aa50884d666b9fd7f31d5967e540f4682b676a5870d4375c49861e6d460

    • SHA512

      55a377767a6b4fc5663f668b7993de8ef83077302b8fa4a74b02f1fff6168f60d5e38e4c5b9dea4eae9a20e13910be00d58a5e4efda4a3a72133730424e294ad

    • SSDEEP

      1536:Bt0R7qPjNebZHSOMqTFrjgSt4lW5wGyPwBH50Py7I:m7q5ebZ3Mqt1wzGyoAy7

    • Boot or Logon Autostart Execution: Print Processors

      Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks