General

  • Target

    16e3c3e0a6db1698b21dd26f9ff90c47_JaffaCakes118

  • Size

    98KB

  • Sample

    240505-kqdyhscg51

  • MD5

    16e3c3e0a6db1698b21dd26f9ff90c47

  • SHA1

    dd700efa2a784ac06f266361b07120d76f6ae46d

  • SHA256

    0eab1aea729f16e245f2d48ff5c6e01c941ea1ddf24a075e6688e39ef562e8b9

  • SHA512

    be6cc084d41519d30dd5559158f3c10417910673a8e2cd8fc720f97fc221185a622846a133c0e2fcee91027a0bce9c530372f8eef8208e5097ce46c242d50b49

  • SSDEEP

    1536:sTXB+5p3Bi+HpM4tmJIxqG0/7vd8xUxPpZzmFOcVf2nxqG0/7vdr:sTs3BxJNmJIxqdLdT/ZzmEZxqdLdr

Malware Config

Targets

    • Target

      16e3c3e0a6db1698b21dd26f9ff90c47_JaffaCakes118

    • Size

      98KB

    • MD5

      16e3c3e0a6db1698b21dd26f9ff90c47

    • SHA1

      dd700efa2a784ac06f266361b07120d76f6ae46d

    • SHA256

      0eab1aea729f16e245f2d48ff5c6e01c941ea1ddf24a075e6688e39ef562e8b9

    • SHA512

      be6cc084d41519d30dd5559158f3c10417910673a8e2cd8fc720f97fc221185a622846a133c0e2fcee91027a0bce9c530372f8eef8208e5097ce46c242d50b49

    • SSDEEP

      1536:sTXB+5p3Bi+HpM4tmJIxqG0/7vd8xUxPpZzmFOcVf2nxqG0/7vdr:sTs3BxJNmJIxqdLdT/ZzmEZxqdLdr

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks