General

  • Target

    a37e7dab62e1bc27058e90fa26bd5e60_JaffaCakes118

  • Size

    76KB

  • Sample

    240403-w798tshb4t

  • MD5

    a37e7dab62e1bc27058e90fa26bd5e60

  • SHA1

    8e08ca884b5490b9efc9f7cc8b2408eefbf96338

  • SHA256

    accad8825cb1550525445007a28a4d2ac8b5db15a6b403d78a4177262a1f681b

  • SHA512

    d3a8e07f08254801ef485a6c6ab8e1a1241c12207f97337bba143c3c3bddc508e57e1f1ef14ffd43303fd527f4300f3ca843945c54c3ae460cc58c3d7d851f0b

  • SSDEEP

    768:spwNDD9IULFMBc237bobA7ymRd0uxUDTJL6oNsgBvAyox0cv:s09IULFMAAiu6JL6oNsgFAyox0cv

Malware Config

Extracted

Family

purecrypter

C2

https://store2.gofile.io/download/11b37007-c27c-4263-8cd6-c28d9e32aac3/Zeohrnnbxotvwryxp.dll

Targets

    • Target

      a37e7dab62e1bc27058e90fa26bd5e60_JaffaCakes118

    • Size

      76KB

    • MD5

      a37e7dab62e1bc27058e90fa26bd5e60

    • SHA1

      8e08ca884b5490b9efc9f7cc8b2408eefbf96338

    • SHA256

      accad8825cb1550525445007a28a4d2ac8b5db15a6b403d78a4177262a1f681b

    • SHA512

      d3a8e07f08254801ef485a6c6ab8e1a1241c12207f97337bba143c3c3bddc508e57e1f1ef14ffd43303fd527f4300f3ca843945c54c3ae460cc58c3d7d851f0b

    • SSDEEP

      768:spwNDD9IULFMBc237bobA7ymRd0uxUDTJL6oNsgBvAyox0cv:s09IULFMAAiu6JL6oNsgFAyox0cv

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Tasks