General

  • Target

    3c5e49ec92d70dc68484d0f64c683001_JaffaCakes118

  • Size

    120KB

  • Sample

    241012-2fy95svdrc

  • MD5

    3c5e49ec92d70dc68484d0f64c683001

  • SHA1

    31324c2a2e5b53851deb81d16da797bbe8784106

  • SHA256

    1e401685de3e68f36b8caa398c747373e5acb3909735780aed8c3b65922f1ffb

  • SHA512

    6c1eb4ec9b69b12d05771ee137561b65a98abe611b2c4fc4718c6a2ad7e2d02f156eba869b51f05113db327ba3c5b0615ae331680f22ea70b8c216d048e5701f

  • SSDEEP

    3072:5tI92RAg17CwLlz8luFAbaGXvQApuaLNWDl:s9EAg17CwLxp0aGX3YhR

Malware Config

Targets

    • Target

      3c5e49ec92d70dc68484d0f64c683001_JaffaCakes118

    • Size

      120KB

    • MD5

      3c5e49ec92d70dc68484d0f64c683001

    • SHA1

      31324c2a2e5b53851deb81d16da797bbe8784106

    • SHA256

      1e401685de3e68f36b8caa398c747373e5acb3909735780aed8c3b65922f1ffb

    • SHA512

      6c1eb4ec9b69b12d05771ee137561b65a98abe611b2c4fc4718c6a2ad7e2d02f156eba869b51f05113db327ba3c5b0615ae331680f22ea70b8c216d048e5701f

    • SSDEEP

      3072:5tI92RAg17CwLlz8luFAbaGXvQApuaLNWDl:s9EAg17CwLxp0aGX3YhR

    • Boot or Logon Autostart Execution: Print Processors

      Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks