General

  • Target

    61ac706f77b6da4bda821e69aef5d27a_JaffaCakes118

  • Size

    4.1MB

  • Sample

    240331-3v96maff71

  • MD5

    61ac706f77b6da4bda821e69aef5d27a

  • SHA1

    ee42220eb9ec46f8788215e71ffdbc136b762cb3

  • SHA256

    6cbec8e331ea6136527401482a98b45e861beab8c7381eb19a135dc9a3bd9fb5

  • SHA512

    3dc17b1a8ee9b4658ab0e462b49642bcdb4cbdf39b21f6da351843f2a550d5dccd953f75b0fff5b4587da189fccbdc75d1a5cd72cc238b378f7b5145029ef2cd

  • SSDEEP

    98304:Pb0DpTItDjUlc5xRsYQCMi2hjHWVhh0zm+0Tp5rboe5jRK:P6QDiMoCMiYjChhx+2p5Poe5w

Malware Config

Extracted

Family

ffdroider

C2

http://186.2.171.3

Extracted

Family

redline

Botnet

PUB

C2

45.9.20.182:52236

Attributes
  • auth_value

    a272f3a2850ec3dccdaed97234b7c40e

Extracted

Family

redline

Botnet

05.10

C2

80.92.205.116:59599

Attributes
  • auth_value

    9987bbbfa5d086577a66d521ae15b57e

Extracted

Family

redline

Botnet

build777

C2

77.232.40.127:8204

Attributes
  • auth_value

    275ce2c87153d4e8e3cc276c686a93de

Extracted

Family

redline

Botnet

ANI222

C2

194.104.136.5:46013

Attributes
  • auth_value

    9491a1c5e11eb6097e68a4fa8627fda8

Extracted

Family

privateloader

C2

http://45.133.1.107/server.txt

pastebin.com/raw/A7dSG1te

http://wfsdragon.ru/api/setStats.php

51.178.186.149

Extracted

Family

gcleaner

C2

ppp-gl.biz

45.9.20.13

Targets

    • Target

      61ac706f77b6da4bda821e69aef5d27a_JaffaCakes118

    • Size

      4.1MB

    • MD5

      61ac706f77b6da4bda821e69aef5d27a

    • SHA1

      ee42220eb9ec46f8788215e71ffdbc136b762cb3

    • SHA256

      6cbec8e331ea6136527401482a98b45e861beab8c7381eb19a135dc9a3bd9fb5

    • SHA512

      3dc17b1a8ee9b4658ab0e462b49642bcdb4cbdf39b21f6da351843f2a550d5dccd953f75b0fff5b4587da189fccbdc75d1a5cd72cc238b378f7b5145029ef2cd

    • SSDEEP

      98304:Pb0DpTItDjUlc5xRsYQCMi2hjHWVhh0zm+0Tp5rboe5jRK:P6QDiMoCMiYjChhx+2p5Poe5w

    • Detect Fabookie payload

    • FFDroider

      Stealer targeting social media platform users first seen in April 2022.

    • FFDroider payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • OnlyLogger

      A tiny loader that uses IPLogger to get its payload.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • OnlyLogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks