General

  • Target

    be828fb341b55c7971f9286c4190d1c1_JaffaCakes118

  • Size

    323KB

  • Sample

    240824-nrfqaazdmp

  • MD5

    be828fb341b55c7971f9286c4190d1c1

  • SHA1

    c874bc617591e8e9c6b5107a824ec44d4a2546f3

  • SHA256

    17d0d52af73577a823c1474376d38d6496cb7d7cb772be49a40590bd65b560ae

  • SHA512

    dd0e3f436eb34cdbf4ab574d64ccff3d59673607840233246e614331373c3fda50b5c6fe1197ca6315bef921a33497201df544fd9efa44ce8fe7982833905cf0

  • SSDEEP

    6144:MRAhhJxX7bNIAROzTuaPUD8XRuf0b4mt/R/A5KHuSOOeG6ijaFgV2p:UsAAPaPUD18t/R/fOSOGSgVG

Malware Config

Targets

    • Target

      be828fb341b55c7971f9286c4190d1c1_JaffaCakes118

    • Size

      323KB

    • MD5

      be828fb341b55c7971f9286c4190d1c1

    • SHA1

      c874bc617591e8e9c6b5107a824ec44d4a2546f3

    • SHA256

      17d0d52af73577a823c1474376d38d6496cb7d7cb772be49a40590bd65b560ae

    • SHA512

      dd0e3f436eb34cdbf4ab574d64ccff3d59673607840233246e614331373c3fda50b5c6fe1197ca6315bef921a33497201df544fd9efa44ce8fe7982833905cf0

    • SSDEEP

      6144:MRAhhJxX7bNIAROzTuaPUD8XRuf0b4mt/R/A5KHuSOOeG6ijaFgV2p:UsAAPaPUD18t/R/fOSOGSgVG

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks