General

  • Target

    2a2dda27017ff9cf9d51d8395d3191ca_JaffaCakes118

  • Size

    1.3MB

  • Sample

    241009-d9p2kawcpd

  • MD5

    2a2dda27017ff9cf9d51d8395d3191ca

  • SHA1

    faeff9c8347a8a97b7c476a10580442ccb8381a7

  • SHA256

    34a9037efe356f1132c1c7c470bb1c7e4a8a8eb25512ea1e9f7cc8ca69d5658d

  • SHA512

    e5ba66d8d53ee9b1c49d4c93cd1a81104e5c0854064d21b6d665ef01b90b5e61dad9f082926fcd03fe2886818b88e2b80350c648e431ffa1370f4d590db8b94e

  • SSDEEP

    24576:LfQdbdfp4kLB4ag6jAbf5RRvKnmU8XOLQz+PH59ON0L7C410V2gMjxcbxivMm1Hq:Ez7A75vvKX8XOLnPZ7C410VJMjxixivi

Malware Config

Targets

    • Target

      2a2dda27017ff9cf9d51d8395d3191ca_JaffaCakes118

    • Size

      1.3MB

    • MD5

      2a2dda27017ff9cf9d51d8395d3191ca

    • SHA1

      faeff9c8347a8a97b7c476a10580442ccb8381a7

    • SHA256

      34a9037efe356f1132c1c7c470bb1c7e4a8a8eb25512ea1e9f7cc8ca69d5658d

    • SHA512

      e5ba66d8d53ee9b1c49d4c93cd1a81104e5c0854064d21b6d665ef01b90b5e61dad9f082926fcd03fe2886818b88e2b80350c648e431ffa1370f4d590db8b94e

    • SSDEEP

      24576:LfQdbdfp4kLB4ag6jAbf5RRvKnmU8XOLQz+PH59ON0L7C410V2gMjxcbxivMm1Hq:Ez7A75vvKX8XOLnPZ7C410VJMjxixivi

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks