General

  • Target

    10ea66306a0d4a862b1be7407627113f_JaffaCakes118

  • Size

    1.8MB

  • Sample

    240503-tp1wbsdf85

  • MD5

    10ea66306a0d4a862b1be7407627113f

  • SHA1

    158a90ae4b5374975b75e86e1c88c4a234616904

  • SHA256

    a05cdf9cbfb06e7f9e5a7ef45df729ea31912bad30fc5534232c6f4f3ed95d08

  • SHA512

    9e3e83b12d3bde88eb92382f10dfe2ebbd9baf2b9caf88c64d88d8a044b2b3c1861c1603b7ad30cc5564f32d122647e178a42fac410a515265450df8180041f9

  • SSDEEP

    49152:OvMW2NU1HlwupfJT4QAXQmH5nb80q5VWy7EeNW:O0hNOFwuPAXQmH5noPtQAW

Malware Config

Targets

    • Target

      10ea66306a0d4a862b1be7407627113f_JaffaCakes118

    • Size

      1.8MB

    • MD5

      10ea66306a0d4a862b1be7407627113f

    • SHA1

      158a90ae4b5374975b75e86e1c88c4a234616904

    • SHA256

      a05cdf9cbfb06e7f9e5a7ef45df729ea31912bad30fc5534232c6f4f3ed95d08

    • SHA512

      9e3e83b12d3bde88eb92382f10dfe2ebbd9baf2b9caf88c64d88d8a044b2b3c1861c1603b7ad30cc5564f32d122647e178a42fac410a515265450df8180041f9

    • SSDEEP

      49152:OvMW2NU1HlwupfJT4QAXQmH5nb80q5VWy7EeNW:O0hNOFwuPAXQmH5noPtQAW

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks