General

  • Target

    e430fc95b96cda8e53428b324ada046a_JaffaCakes118

  • Size

    110KB

  • Sample

    240916-g7qrvstall

  • MD5

    e430fc95b96cda8e53428b324ada046a

  • SHA1

    327aebbacedceddcac25756496c3794cce65f807

  • SHA256

    222e883d6896effdd0f0b5849269483874e1e308dab3d6f49599c398ca4d8c31

  • SHA512

    b1280a9cc1cdb0372caf638400d9115cc1edc8e172544a917343c932d3dd870bfb769e15e3d5d675eb6ff22b035a06e8b5e612009610996b5282cd99cdeadaa2

  • SSDEEP

    1536:61EFINcGWnrdzMCfrGL+XndCDD5ds+e5s1vMDHKkDkULfmoVq:aEOeG4dzMs1XdCDTGSNoHKgq

Malware Config

Targets

    • Target

      Invoice_ 69010.16_10.doc

    • Size

      77KB

    • MD5

      a8eda3039c4cbbb362eb5847ed38e37a

    • SHA1

      a1dca8f8ca13895aa9eb84456c7a2a92e1457e27

    • SHA256

      e006216019968c4bcdf3a7962842ed9200927f17578bcc45ea65e77955b6fd3f

    • SHA512

      9792974f387a872d04be16d35b9f2de407926000d0781c0dda569021e531fe0d57217a9bfb4d3cb60f2c038e24c4456a8c98ae1a8e5ffc019d776ed23d9e7ded

    • SSDEEP

      768:dD3bcTOAe/uqeX61y7PDqfgljPOs+jNWNA4H7dLuVXBk0KEzt6ePrMBfr:tsO5ucuqIljPOs+jH8VuVXBki8ezy

    • FlawedAmmyy RAT

      Remote-access trojan based on leaked code for the Ammyy remote admin software.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks