General

  • Target

    158f6d23703e5052c808b162adb7df4b_JaffaCakes118

  • Size

    784KB

  • Sample

    240505-cwn2nsbh9y

  • MD5

    158f6d23703e5052c808b162adb7df4b

  • SHA1

    16789f0fceaf1d8e36d2b4d310b819ccfa5bc52f

  • SHA256

    87a7a6196c52b88f490000ba9e4c65496f73738d1e31c1e5c87038ec4e958c83

  • SHA512

    2d758c5bb38f52837a284f7f75e0c9a5479eb627502fdc3fda7bfdf555e889253697a2251375ef91400a99b295ed3cb4511b2feee00d015e39c8e9e8e8d0e07c

  • SSDEEP

    12288:P+Yu4qDKQHY9o5OmG1Zhw0JcRgvKOIyG:PvqDHHYkOl+RRIKdv

Malware Config

Targets

    • Target

      158f6d23703e5052c808b162adb7df4b_JaffaCakes118

    • Size

      784KB

    • MD5

      158f6d23703e5052c808b162adb7df4b

    • SHA1

      16789f0fceaf1d8e36d2b4d310b819ccfa5bc52f

    • SHA256

      87a7a6196c52b88f490000ba9e4c65496f73738d1e31c1e5c87038ec4e958c83

    • SHA512

      2d758c5bb38f52837a284f7f75e0c9a5479eb627502fdc3fda7bfdf555e889253697a2251375ef91400a99b295ed3cb4511b2feee00d015e39c8e9e8e8d0e07c

    • SSDEEP

      12288:P+Yu4qDKQHY9o5OmG1Zhw0JcRgvKOIyG:PvqDHHYkOl+RRIKdv

    • Detect ZGRat V1

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks