General

  • Target

    e5ac6f9f85c0e55f0d164afa56a45890_JaffaCakes118

  • Size

    947KB

  • Sample

    240407-x2tjkaca9s

  • MD5

    e5ac6f9f85c0e55f0d164afa56a45890

  • SHA1

    06f0eccf410176d514b86b02f602699d58d56b5a

  • SHA256

    f173cd6a86e6aaf1ebaddd4e14b8933516246d1bb320ddbe7c221895bb9281b6

  • SHA512

    7d067b3a1f13057588c6cbb751b9ce16fd4d444af130780d9ade2ded97ba43160a0bdf70eae33459483d73e737f8e99f096053b8b7213192ef08c5bbb3f2a075

  • SSDEEP

    12288:O1UVGInYjg53VLFvth+w7GodQpbelTw4cMb9eQ1kPHSlFi48soHo:O1UVGInYj6vv/Nv+kTJ9kQ1SyLoH

Malware Config

Targets

    • Target

      e5ac6f9f85c0e55f0d164afa56a45890_JaffaCakes118

    • Size

      947KB

    • MD5

      e5ac6f9f85c0e55f0d164afa56a45890

    • SHA1

      06f0eccf410176d514b86b02f602699d58d56b5a

    • SHA256

      f173cd6a86e6aaf1ebaddd4e14b8933516246d1bb320ddbe7c221895bb9281b6

    • SHA512

      7d067b3a1f13057588c6cbb751b9ce16fd4d444af130780d9ade2ded97ba43160a0bdf70eae33459483d73e737f8e99f096053b8b7213192ef08c5bbb3f2a075

    • SSDEEP

      12288:O1UVGInYjg53VLFvth+w7GodQpbelTw4cMb9eQ1kPHSlFi48soHo:O1UVGInYj6vv/Nv+kTJ9kQ1SyLoH

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks