General

  • Target

    02f24afdc3235a293c1dff7df9830052_JaffaCakes118

  • Size

    3.7MB

  • Sample

    240427-lh9wnagd41

  • MD5

    02f24afdc3235a293c1dff7df9830052

  • SHA1

    ad437e54a1797a92dc08811595ddabb610b73837

  • SHA256

    e1a97322253305683801ce5038c6d7b620708488d3dd4ff23cb781605b5bd39c

  • SHA512

    01312fb2489229143b211b887053548de279d6bb73affcade5a3ea0d6b8fa091d6ae2a28eba27ae85c78c6ad780acec9160702974d2d28e0199e8dd8a6f08941

  • SSDEEP

    98304:dvfapmo1Y4+6Y7SOEfX/SbgRJL/aSlq77GBfWyt77GBfW:da9+6Y7SOEibgRaGBfWoGBfW

Malware Config

Targets

    • Target

      02f24afdc3235a293c1dff7df9830052_JaffaCakes118

    • Size

      3.7MB

    • MD5

      02f24afdc3235a293c1dff7df9830052

    • SHA1

      ad437e54a1797a92dc08811595ddabb610b73837

    • SHA256

      e1a97322253305683801ce5038c6d7b620708488d3dd4ff23cb781605b5bd39c

    • SHA512

      01312fb2489229143b211b887053548de279d6bb73affcade5a3ea0d6b8fa091d6ae2a28eba27ae85c78c6ad780acec9160702974d2d28e0199e8dd8a6f08941

    • SSDEEP

      98304:dvfapmo1Y4+6Y7SOEfX/SbgRJL/aSlq77GBfWyt77GBfW:da9+6Y7SOEibgRaGBfWoGBfW

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • UAC bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

4
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks