General

  • Target

    b4f4957b8ace5c6a91d9178a03f33b97_JaffaCakes118

  • Size

    135KB

  • Sample

    241130-fz5elsypap

  • MD5

    b4f4957b8ace5c6a91d9178a03f33b97

  • SHA1

    6cd8463d611c84b87e49f0f3541530eb08e857c5

  • SHA256

    19abf7ed826edd9c98b153cc27b816936e1b7078c7c88c50844f05e12cdc206f

  • SHA512

    da40e95e2b6560acab16d2a151bfa1e29f15f88907dd73e659c8b16583feed4d6e2847423d0bc2b97ecb951dec72066acc5151f91baf0c52400e774e8b1490ae

  • SSDEEP

    1536:37v0kchIvFz70fiVdqDkhSchSWiSDWP/OsWQH6CazASXhXSWLlWT3PmcsYN/Xzgi:3ooF4iVdubWibOQNi3MWL4FksNYFfPK

Malware Config

Targets

    • Target

      b4f4957b8ace5c6a91d9178a03f33b97_JaffaCakes118

    • Size

      135KB

    • MD5

      b4f4957b8ace5c6a91d9178a03f33b97

    • SHA1

      6cd8463d611c84b87e49f0f3541530eb08e857c5

    • SHA256

      19abf7ed826edd9c98b153cc27b816936e1b7078c7c88c50844f05e12cdc206f

    • SHA512

      da40e95e2b6560acab16d2a151bfa1e29f15f88907dd73e659c8b16583feed4d6e2847423d0bc2b97ecb951dec72066acc5151f91baf0c52400e774e8b1490ae

    • SSDEEP

      1536:37v0kchIvFz70fiVdqDkhSchSWiSDWP/OsWQH6CazASXhXSWLlWT3PmcsYN/Xzgi:3ooF4iVdubWibOQNi3MWL4FksNYFfPK

    • UAC bypass

    • A potential corporate email address has been identified in the URL: EC@avif

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks