General

  • Target

    13d4fe2424181449715a6cb814943056_JaffaCakes118

  • Size

    62KB

  • Sample

    241004-sdwa2azhkl

  • MD5

    13d4fe2424181449715a6cb814943056

  • SHA1

    2efe686f1010093afe4016a63f59c7207b4f8fe5

  • SHA256

    f6f12d72695820ae81673bf2aa29547b4b64985cfa0c0c3584f1d48ac2d411c2

  • SHA512

    cb8eb3cbbfaccd4df03a2d1b6fd0eece09193874ffc5310c606c1766b8216f3325ddcc6c198fc0ce906120d5f47693f83b2d5f30454ba8d61d92ace98e33cd3b

  • SSDEEP

    768:aLNEVIDpRCBeOJvxgQq+4fJ24FYHAhVbqOJluGLP5R70CXcg4jnkCouFO5Jl:7ID8LxgR+Q29HubbjrvJ4rroug5Jl

Malware Config

Targets

    • Target

      13d4fe2424181449715a6cb814943056_JaffaCakes118

    • Size

      62KB

    • MD5

      13d4fe2424181449715a6cb814943056

    • SHA1

      2efe686f1010093afe4016a63f59c7207b4f8fe5

    • SHA256

      f6f12d72695820ae81673bf2aa29547b4b64985cfa0c0c3584f1d48ac2d411c2

    • SHA512

      cb8eb3cbbfaccd4df03a2d1b6fd0eece09193874ffc5310c606c1766b8216f3325ddcc6c198fc0ce906120d5f47693f83b2d5f30454ba8d61d92ace98e33cd3b

    • SSDEEP

      768:aLNEVIDpRCBeOJvxgQq+4fJ24FYHAhVbqOJluGLP5R70CXcg4jnkCouFO5Jl:7ID8LxgR+Q29HubbjrvJ4rroug5Jl

    • Boot or Logon Autostart Execution: Print Processors

      Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks