General

  • Target

    2645e40c7a317029db564fb8b2bbe8ce_JaffaCakes118

  • Size

    943KB

  • Sample

    240508-xp6claac4z

  • MD5

    2645e40c7a317029db564fb8b2bbe8ce

  • SHA1

    82e2c7e9d7bfa7931950b3242705ff68ee5ca96c

  • SHA256

    c5f6b79a0b63ff565f7508f2f3226a8d7af2bdd0f2d2c3d0d776c1c58fedc447

  • SHA512

    5e62131c844ecbf3b71c7d7365c7ab12ba591fc1c1157c1eeb524b74a791224265a7b23b1e70bac0655392f056e96aa9d6ff43113b0a5e1792d28228a7e3cf24

  • SSDEEP

    24576:yh1n2Ltlpm+x/Kjpnsw1Ihev0+3CqkRfG:wd2Zlk+patswqhp+yjG

Malware Config

Targets

    • Target

      2645e40c7a317029db564fb8b2bbe8ce_JaffaCakes118

    • Size

      943KB

    • MD5

      2645e40c7a317029db564fb8b2bbe8ce

    • SHA1

      82e2c7e9d7bfa7931950b3242705ff68ee5ca96c

    • SHA256

      c5f6b79a0b63ff565f7508f2f3226a8d7af2bdd0f2d2c3d0d776c1c58fedc447

    • SHA512

      5e62131c844ecbf3b71c7d7365c7ab12ba591fc1c1157c1eeb524b74a791224265a7b23b1e70bac0655392f056e96aa9d6ff43113b0a5e1792d28228a7e3cf24

    • SSDEEP

      24576:yh1n2Ltlpm+x/Kjpnsw1Ihev0+3CqkRfG:wd2Zlk+patswqhp+yjG

    • Detect ZGRat V1

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks