General

  • Target

    3d8ee6111d4aba047d497bcbaba3536a_JaffaCakes118

  • Size

    137KB

  • Sample

    241013-d3bklaxbrb

  • MD5

    3d8ee6111d4aba047d497bcbaba3536a

  • SHA1

    6fe01ec9105e85226ffe2e67ab18b2f5c8c58cbb

  • SHA256

    e22f4ca8d82374326dbb1a74a41b981730808e9b1080bba0b14955cb64a08129

  • SHA512

    0beceaf908299d4ae83083d7fefdf83e4e663e074f0e0d3ee48e0223eb73ccb30d5aca0710e97989ea706e8a737af63dc1547fbe292452a02071cd32e5f978bd

  • SSDEEP

    3072:HGrXlJIVX9LGja3R/iWOrc71yNKL/uFB4e0ftmV30j6Cn:mjcGj2/iJc71+KUz0fQSj

Malware Config

Targets

    • Target

      3d8ee6111d4aba047d497bcbaba3536a_JaffaCakes118

    • Size

      137KB

    • MD5

      3d8ee6111d4aba047d497bcbaba3536a

    • SHA1

      6fe01ec9105e85226ffe2e67ab18b2f5c8c58cbb

    • SHA256

      e22f4ca8d82374326dbb1a74a41b981730808e9b1080bba0b14955cb64a08129

    • SHA512

      0beceaf908299d4ae83083d7fefdf83e4e663e074f0e0d3ee48e0223eb73ccb30d5aca0710e97989ea706e8a737af63dc1547fbe292452a02071cd32e5f978bd

    • SSDEEP

      3072:HGrXlJIVX9LGja3R/iWOrc71yNKL/uFB4e0ftmV30j6Cn:mjcGj2/iJc71+KUz0fQSj

    • Boot or Logon Autostart Execution: Print Processors

      Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks