General

  • Target

    d6a11be3feb4999e51e849c71a55572f_JaffaCakes118

  • Size

    268KB

  • Sample

    240909-s8fh3aycqg

  • MD5

    d6a11be3feb4999e51e849c71a55572f

  • SHA1

    04d585738444254dc86a456f0ea71f57e3e9924b

  • SHA256

    879c25d4bc60ce8a71f9deb44ce9665d8889d444ab95961944586f8fd78515f4

  • SHA512

    44b8245727152a18145f9d04bec915b931561e178d78640df928f1c734f57126acd25cf4ed5c8e2bd4d5b456515add8bf75a56f922cd21b1a78f887ce7639920

  • SSDEEP

    6144:oFxMSF6RDudDquK750k36UrrCBaljHaxAOx:o8SFaI8qUrmoV

Malware Config

Targets

    • Target

      d6a11be3feb4999e51e849c71a55572f_JaffaCakes118

    • Size

      268KB

    • MD5

      d6a11be3feb4999e51e849c71a55572f

    • SHA1

      04d585738444254dc86a456f0ea71f57e3e9924b

    • SHA256

      879c25d4bc60ce8a71f9deb44ce9665d8889d444ab95961944586f8fd78515f4

    • SHA512

      44b8245727152a18145f9d04bec915b931561e178d78640df928f1c734f57126acd25cf4ed5c8e2bd4d5b456515add8bf75a56f922cd21b1a78f887ce7639920

    • SSDEEP

      6144:oFxMSF6RDudDquK750k36UrrCBaljHaxAOx:o8SFaI8qUrmoV

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks