General

  • Target

    162314abb4b14186ecccf56ec2a5357c_JaffaCakes118

  • Size

    986KB

  • Sample

    240505-fxlvgsbc99

  • MD5

    162314abb4b14186ecccf56ec2a5357c

  • SHA1

    9452d0b1c162f1ffb162afaed2b3a247ba7d783b

  • SHA256

    9d477f1a6f51f17e953c0d8beab2e92e28cedeac1bc3332f193f15331bd70c92

  • SHA512

    063a28fde9ecd199adf4c33acc18f03e0e28fcefec5dd8233d011e69ac01ea81669508ac3c6b411311e9a7e5315bc5f16ea9252129dbe155e23f6d6c28bb28d7

  • SSDEEP

    24576:nrYUhzRsCg6Yn++QKSxrajbJQngG8RnPPuabSnNNJ:r+Cg6Kbbkrk6grRPPBsNJ

Malware Config

Targets

    • Target

      162314abb4b14186ecccf56ec2a5357c_JaffaCakes118

    • Size

      986KB

    • MD5

      162314abb4b14186ecccf56ec2a5357c

    • SHA1

      9452d0b1c162f1ffb162afaed2b3a247ba7d783b

    • SHA256

      9d477f1a6f51f17e953c0d8beab2e92e28cedeac1bc3332f193f15331bd70c92

    • SHA512

      063a28fde9ecd199adf4c33acc18f03e0e28fcefec5dd8233d011e69ac01ea81669508ac3c6b411311e9a7e5315bc5f16ea9252129dbe155e23f6d6c28bb28d7

    • SSDEEP

      24576:nrYUhzRsCg6Yn++QKSxrajbJQngG8RnPPuabSnNNJ:r+Cg6Kbbkrk6grRPPBsNJ

    • Detect ZGRat V1

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks