General

  • Target

    fc6f5710617da1b8662391639005484e_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240420-lc5pradd72

  • MD5

    fc6f5710617da1b8662391639005484e

  • SHA1

    374cbdc4d919b2f8eb12926d62f10f36b5012d44

  • SHA256

    a459ae8ff0c5a68bb41a5690433c33e11a38798e34662a6d77950c6ea3e6c5c7

  • SHA512

    9a685d225675cee3ae1707dab3ee1700bff0157d32bf5136b76602e366144e8d3f6f069ff59f7b671f273f944af928b195421b835f1668b512400921dfc52416

  • SSDEEP

    49152:kyoR6FDbTpKIYYvlTPSZq1yFtMyMpy7Rk47JKyAWkkP:kDAFv1KImq18PWGR0yAWZ

Malware Config

Targets

    • Target

      fc6f5710617da1b8662391639005484e_JaffaCakes118

    • Size

      2.2MB

    • MD5

      fc6f5710617da1b8662391639005484e

    • SHA1

      374cbdc4d919b2f8eb12926d62f10f36b5012d44

    • SHA256

      a459ae8ff0c5a68bb41a5690433c33e11a38798e34662a6d77950c6ea3e6c5c7

    • SHA512

      9a685d225675cee3ae1707dab3ee1700bff0157d32bf5136b76602e366144e8d3f6f069ff59f7b671f273f944af928b195421b835f1668b512400921dfc52416

    • SSDEEP

      49152:kyoR6FDbTpKIYYvlTPSZq1yFtMyMpy7Rk47JKyAWkkP:kDAFv1KImq18PWGR0yAWZ

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

1
T1082

Tasks