General

  • Target

    bfd5d5ef22932eb41a1e1bc884df7323_JaffaCakes118

  • Size

    100KB

  • Sample

    240825-bmfhhasajp

  • MD5

    bfd5d5ef22932eb41a1e1bc884df7323

  • SHA1

    50b3a3b22d27eab5ee3f56785ae72da4ecf0de28

  • SHA256

    b8618eb7fb53527b6d902b9c422778d6fded4a7c9a703e5c6f726f8eb5710673

  • SHA512

    095ee439dc42302db18666d1461d4e306c1b35de8c8db937c3c09c70614a41a20b30e85e0799768b7889ddf163293cbc436543965afefaf359b950f1467a2e25

  • SSDEEP

    3072:A/tpNXxTpBk0anDBGaaE5y1ZykTsRgo7kY:etTX5e7aE5GM8FY

Malware Config

Targets

    • Target

      bfd5d5ef22932eb41a1e1bc884df7323_JaffaCakes118

    • Size

      100KB

    • MD5

      bfd5d5ef22932eb41a1e1bc884df7323

    • SHA1

      50b3a3b22d27eab5ee3f56785ae72da4ecf0de28

    • SHA256

      b8618eb7fb53527b6d902b9c422778d6fded4a7c9a703e5c6f726f8eb5710673

    • SHA512

      095ee439dc42302db18666d1461d4e306c1b35de8c8db937c3c09c70614a41a20b30e85e0799768b7889ddf163293cbc436543965afefaf359b950f1467a2e25

    • SSDEEP

      3072:A/tpNXxTpBk0anDBGaaE5y1ZykTsRgo7kY:etTX5e7aE5GM8FY

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks