General

  • Target

    3e7dd715a15046585cb8034a1fa847b3_JaffaCakes118

  • Size

    12KB

  • Sample

    240330-sq511agh2w

  • MD5

    3e7dd715a15046585cb8034a1fa847b3

  • SHA1

    4cbe1b633a7859821c0b7082385407cb140a0ba5

  • SHA256

    5518f5e20b27a4b10ebc7abce37c733ab532354b5db6aed7edf19c25caba2ff3

  • SHA512

    42777bf0328fe9844aa93e8394f11aba8d02d6bbc77980da2c22bb5b9f9a646763ed4506976dfbf3d2476ca63fbc0845bb5be64c3a6c745daffdd7f7d85f960a

  • SSDEEP

    384:Y7z4C7+owFhl3rwUY5mn33QPHOS2A9P2N:Y7zV+ow5qk3AOSx9q

Malware Config

Targets

    • Target

      3e7dd715a15046585cb8034a1fa847b3_JaffaCakes118

    • Size

      12KB

    • MD5

      3e7dd715a15046585cb8034a1fa847b3

    • SHA1

      4cbe1b633a7859821c0b7082385407cb140a0ba5

    • SHA256

      5518f5e20b27a4b10ebc7abce37c733ab532354b5db6aed7edf19c25caba2ff3

    • SHA512

      42777bf0328fe9844aa93e8394f11aba8d02d6bbc77980da2c22bb5b9f9a646763ed4506976dfbf3d2476ca63fbc0845bb5be64c3a6c745daffdd7f7d85f960a

    • SSDEEP

      384:Y7z4C7+owFhl3rwUY5mn33QPHOS2A9P2N:Y7zV+ow5qk3AOSx9q

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks