General

  • Target

    fa9e34915a764dad02c5283c3cec91df_JaffaCakes118

  • Size

    100KB

  • Sample

    240927-sdenaaxgqk

  • MD5

    fa9e34915a764dad02c5283c3cec91df

  • SHA1

    501e70505606ad7270bb75448f3d01926dccd745

  • SHA256

    41dd52426d9e279757237f34b709c8ef4e97f32b3da02b3ed7dd8610ad52e310

  • SHA512

    2935c3ea74e31492a9ca316f0262d97cefc25a844867ae10dc5b8af4a7d68e18ab4b0b512e7b6415ed0cb286d32ded7e36e7dbfdbdfc61d24c95a43ff9481451

  • SSDEEP

    3072:cbP8Ugz8PyUiw8EABBSHzKYtAI8t17rLHof:E0UDcHLvGWmotP

Malware Config

Targets

    • Target

      fa9e34915a764dad02c5283c3cec91df_JaffaCakes118

    • Size

      100KB

    • MD5

      fa9e34915a764dad02c5283c3cec91df

    • SHA1

      501e70505606ad7270bb75448f3d01926dccd745

    • SHA256

      41dd52426d9e279757237f34b709c8ef4e97f32b3da02b3ed7dd8610ad52e310

    • SHA512

      2935c3ea74e31492a9ca316f0262d97cefc25a844867ae10dc5b8af4a7d68e18ab4b0b512e7b6415ed0cb286d32ded7e36e7dbfdbdfc61d24c95a43ff9481451

    • SSDEEP

      3072:cbP8Ugz8PyUiw8EABBSHzKYtAI8t17rLHof:E0UDcHLvGWmotP

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks