General

  • Target

    045786107260b79f118f73ad58f68bc4_JaffaCakes118

  • Size

    25.5MB

  • Sample

    240428-eqdd4agb3w

  • MD5

    045786107260b79f118f73ad58f68bc4

  • SHA1

    ed93910aa6872d69df361d90b5baa0a6405f900c

  • SHA256

    262637f0d632fb2cbb247377a1fbbdeb5fa94f2708155efb3ed9dcd060510cca

  • SHA512

    7fb9c7f4d4cde73daa3faa55a61973a41f8eb685b0090de523039e111c35b192f78d08562d101702f9cce86c2d6e228c959ed189d381fef001b63e856a61bae8

  • SSDEEP

    393216:dFgRav6cD534K8vhdFgRav6cD534K8vh:zv6cDqKChzv6cDqKCh

Malware Config

Targets

    • Target

      045786107260b79f118f73ad58f68bc4_JaffaCakes118

    • Size

      25.5MB

    • MD5

      045786107260b79f118f73ad58f68bc4

    • SHA1

      ed93910aa6872d69df361d90b5baa0a6405f900c

    • SHA256

      262637f0d632fb2cbb247377a1fbbdeb5fa94f2708155efb3ed9dcd060510cca

    • SHA512

      7fb9c7f4d4cde73daa3faa55a61973a41f8eb685b0090de523039e111c35b192f78d08562d101702f9cce86c2d6e228c959ed189d381fef001b63e856a61bae8

    • SSDEEP

      393216:dFgRav6cD534K8vhdFgRav6cD534K8vh:zv6cDqKChzv6cDqKCh

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

4
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks