General

  • Target

    1299315c3032491208ef04f8674aa5fa_JaffaCakes118

  • Size

    603KB

  • Sample

    240504-nylj4sfh32

  • MD5

    1299315c3032491208ef04f8674aa5fa

  • SHA1

    f320997f6f3479ef392be9f35e1f5b600f9f42f1

  • SHA256

    11724aa717338d3fa58fc1c6d92cdf9b64ca986b0e2f6cde1a5d795d6277fc4c

  • SHA512

    41025d5293d43d630c932d1b186c75c793cf9430222a90e02c719c2b5a436715c3298626ef1c1567f92a42e468f8abb5c053e44c38d339b1e75c5b329ed8474a

  • SSDEEP

    6144:BHmz3+U3iFSMYN5Exf2o9LnIH8iN/wfGB4Dosj1E+6VVPviDlSOcwhxAwOhgYwj7:9rtZmXN4zJpGPqlSpwhm4s5bsGSCs5

Malware Config

Targets

    • Target

      1299315c3032491208ef04f8674aa5fa_JaffaCakes118

    • Size

      603KB

    • MD5

      1299315c3032491208ef04f8674aa5fa

    • SHA1

      f320997f6f3479ef392be9f35e1f5b600f9f42f1

    • SHA256

      11724aa717338d3fa58fc1c6d92cdf9b64ca986b0e2f6cde1a5d795d6277fc4c

    • SHA512

      41025d5293d43d630c932d1b186c75c793cf9430222a90e02c719c2b5a436715c3298626ef1c1567f92a42e468f8abb5c053e44c38d339b1e75c5b329ed8474a

    • SSDEEP

      6144:BHmz3+U3iFSMYN5Exf2o9LnIH8iN/wfGB4Dosj1E+6VVPviDlSOcwhxAwOhgYwj7:9rtZmXN4zJpGPqlSpwhm4s5bsGSCs5

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks