General

  • Target

    fba819d2e345ae62fe34712d79c24497380d5709433ac30573ad30318d6f2857_JaffaCakes118

  • Size

    6.7MB

  • Sample

    240420-b66tssdc54

  • MD5

    159d7c28ef8ee5dec81bdf46901a5ddf

  • SHA1

    43d9a7041ae46cc9ece69604429bffea6db38369

  • SHA256

    fba819d2e345ae62fe34712d79c24497380d5709433ac30573ad30318d6f2857

  • SHA512

    8d76288ff9c4c561597c5c7eea63b1bc51531f5017fdfdc47ab9b5b490f3a659b7482c37b2cbc463dc49fce39d45a3daaf924f0af1fc009eb46a750ee56af175

  • SSDEEP

    196608:tLN9J6MdRdADPOXQh/aY+LMcNLWZGUPzbsr5ht4dD:5N9JDQmAddk4HLIrydD

Malware Config

Targets

    • Target

      fba819d2e345ae62fe34712d79c24497380d5709433ac30573ad30318d6f2857_JaffaCakes118

    • Size

      6.7MB

    • MD5

      159d7c28ef8ee5dec81bdf46901a5ddf

    • SHA1

      43d9a7041ae46cc9ece69604429bffea6db38369

    • SHA256

      fba819d2e345ae62fe34712d79c24497380d5709433ac30573ad30318d6f2857

    • SHA512

      8d76288ff9c4c561597c5c7eea63b1bc51531f5017fdfdc47ab9b5b490f3a659b7482c37b2cbc463dc49fce39d45a3daaf924f0af1fc009eb46a750ee56af175

    • SSDEEP

      196608:tLN9J6MdRdADPOXQh/aY+LMcNLWZGUPzbsr5ht4dD:5N9JDQmAddk4HLIrydD

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Tasks