General

  • Target

    f617c9547ee89883fd6694d31d0b7a52_JaffaCakes118

  • Size

    122KB

  • Sample

    240417-swy5msdh97

  • MD5

    f617c9547ee89883fd6694d31d0b7a52

  • SHA1

    48ddfcfb451ee2ade25472179ba9ac93655f6574

  • SHA256

    28ccdc782b4710a937d3b3bb108803e41117a5110b0329c659dae02f3ce72aa1

  • SHA512

    fd1ec5907bd807c7b98bd7b4c6b5f7acc40135fe5bb76fb7224edd4e890ecc4b48898a08d5fe8b756c4ec2e0bb1a736efdfd0ebcbd6979a0b057c813da78a984

  • SSDEEP

    3072:GnHXMpxcGxFyhQ0bOqYhGO1PgN7Hn9LeXrfit3R6jyTZ6WxE:iHmGY/o0hGO2JdL2I3cXWxE

Score
8/10

Malware Config

Targets

    • Target

      GOLAYA-RUSSKAYA.exe

    • Size

      238KB

    • MD5

      4bf7fbae5d85b68dba3a92e172504238

    • SHA1

      641a659c755e3adafa971a3f32c6e47b4f5f1173

    • SHA256

      2e8efaea895111c02f1efddb99fa07fdd1e9c2318d488ae6c9b27064f6c0feac

    • SHA512

      93e67706c4d5ffd05de586f612c8af211630921e2b91b5ec488a734fa951835caab543da76160f21bec8160473017857bcdd5625440a9247279986d05468e96d

    • SSDEEP

      6144:zbXE9OiTGfhEClq9dqCvR/w/3E616xKJJUm:/U9XiuiURI/ss

    Score
    8/10
    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks