General

  • Target

    eaafc2317a215bbabdfa01fdc1e6cb2c_JaffaCakes118

  • Size

    115KB

  • Sample

    240919-gcbz8atdpq

  • MD5

    eaafc2317a215bbabdfa01fdc1e6cb2c

  • SHA1

    10feff2ec25d009149322ed9ca5c6b7a18bb8434

  • SHA256

    63aa0b76188e252c468fda0a680348cb7fb8e46ab593f8b5f566e6baa191f530

  • SHA512

    ac1ff1642e58a487d33a0dd83b0fc0c7b25f7199ca3243f71abd68e81443ac8fae6949d58049872bee283856b6f0c82d6d103d509ff7a35d7528694280d40c6c

  • SSDEEP

    3072:/GaK4XabO7xlI8r9iJw7AzAAn/6asu1TUybroaUKZt:xpCzAiAu14yfoFKZ

Malware Config

Targets

    • Target

      eaafc2317a215bbabdfa01fdc1e6cb2c_JaffaCakes118

    • Size

      115KB

    • MD5

      eaafc2317a215bbabdfa01fdc1e6cb2c

    • SHA1

      10feff2ec25d009149322ed9ca5c6b7a18bb8434

    • SHA256

      63aa0b76188e252c468fda0a680348cb7fb8e46ab593f8b5f566e6baa191f530

    • SHA512

      ac1ff1642e58a487d33a0dd83b0fc0c7b25f7199ca3243f71abd68e81443ac8fae6949d58049872bee283856b6f0c82d6d103d509ff7a35d7528694280d40c6c

    • SSDEEP

      3072:/GaK4XabO7xlI8r9iJw7AzAAn/6asu1TUybroaUKZt:xpCzAiAu14yfoFKZ

    • Boot or Logon Autostart Execution: Print Processors

      Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks