General

  • Target

    ea9ae0873ce4eb8c4f687059a51e09b6_JaffaCakes118

  • Size

    882KB

  • Sample

    240919-fbc1fs1hkn

  • MD5

    ea9ae0873ce4eb8c4f687059a51e09b6

  • SHA1

    a0de69036b585185cb0a7e4d878682ec4afc2546

  • SHA256

    7e4eed6c27228c3bef0fd28e75a5e6c6e63568bfd8392f2db6416e2cd30d271d

  • SHA512

    f0a5074a45de3744ff2609942ec6d47936cc59bcca7c6f83566960b227adf0571c14b6c52e1c4cd5031a8eb3294f631474f18aef406cf960cbb801d49c00f0a6

  • SSDEEP

    24576:Y5L6vEqMNvT7SUGwsBxO+YekfBh9+ZyKQt/NlfTI:Y5BJNp5sBxO+Yth9WYt/Nl7I

Malware Config

Targets

    • Target

      ea9ae0873ce4eb8c4f687059a51e09b6_JaffaCakes118

    • Size

      882KB

    • MD5

      ea9ae0873ce4eb8c4f687059a51e09b6

    • SHA1

      a0de69036b585185cb0a7e4d878682ec4afc2546

    • SHA256

      7e4eed6c27228c3bef0fd28e75a5e6c6e63568bfd8392f2db6416e2cd30d271d

    • SHA512

      f0a5074a45de3744ff2609942ec6d47936cc59bcca7c6f83566960b227adf0571c14b6c52e1c4cd5031a8eb3294f631474f18aef406cf960cbb801d49c00f0a6

    • SSDEEP

      24576:Y5L6vEqMNvT7SUGwsBxO+YekfBh9+ZyKQt/NlfTI:Y5BJNp5sBxO+Yth9WYt/Nl7I

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks