General

  • Target

    17dd1fca329fdf0575e4d4ff626898f5_JaffaCakes118

  • Size

    120KB

  • Sample

    241006-nea92a1dkn

  • MD5

    17dd1fca329fdf0575e4d4ff626898f5

  • SHA1

    bf65988a0773922d450a80f723f5c426c24be2fc

  • SHA256

    c7c772da50649d6b638edb5b655f7788fa380cdb45f80d290835630b5ab4460c

  • SHA512

    f279e37bfce146f832101e47bb9dfc2b28197b6afcca95b508a5beb4d3bf20f82e2b31552e5de4209cd355a33961edeb659b93a3ded876ac588c0197ad95b709

  • SSDEEP

    3072:K/uqwf9se/JUkxRWySst8CojxrdQU9s7:K/uxfOCuQROstGxrdV9

Malware Config

Targets

    • Target

      17dd1fca329fdf0575e4d4ff626898f5_JaffaCakes118

    • Size

      120KB

    • MD5

      17dd1fca329fdf0575e4d4ff626898f5

    • SHA1

      bf65988a0773922d450a80f723f5c426c24be2fc

    • SHA256

      c7c772da50649d6b638edb5b655f7788fa380cdb45f80d290835630b5ab4460c

    • SHA512

      f279e37bfce146f832101e47bb9dfc2b28197b6afcca95b508a5beb4d3bf20f82e2b31552e5de4209cd355a33961edeb659b93a3ded876ac588c0197ad95b709

    • SSDEEP

      3072:K/uqwf9se/JUkxRWySst8CojxrdQU9s7:K/uxfOCuQROstGxrdV9

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks