General

  • Target

    336e6d4b9e8b8ac0d191a99d992e40b0_JaffaCakes118

  • Size

    564KB

  • Sample

    240511-h9z9rade3s

  • MD5

    336e6d4b9e8b8ac0d191a99d992e40b0

  • SHA1

    d204e15e169d909171fbae5a8445c8f974d316c9

  • SHA256

    ceb87ebc670d67f91d08ccc0ea6c6a24f974e99890839d5147f7feb597b51489

  • SHA512

    c52e6ce618810df0719fe647b8e70ff275199bb4a0d5628429de40b16d466b6d4538704024f03db8fad91b658c8d351637ca016eba1d8566af736fb3035029dd

  • SSDEEP

    12288:sREMc3GfziFWwrOO4pe+F3Q4/Pa6K6g+RgDNEV1850RixGs4Pi7ot:sqMqyFwrODpe+C36K6g+R6EHe0RixP4f

Malware Config

Targets

    • Target

      336e6d4b9e8b8ac0d191a99d992e40b0_JaffaCakes118

    • Size

      564KB

    • MD5

      336e6d4b9e8b8ac0d191a99d992e40b0

    • SHA1

      d204e15e169d909171fbae5a8445c8f974d316c9

    • SHA256

      ceb87ebc670d67f91d08ccc0ea6c6a24f974e99890839d5147f7feb597b51489

    • SHA512

      c52e6ce618810df0719fe647b8e70ff275199bb4a0d5628429de40b16d466b6d4538704024f03db8fad91b658c8d351637ca016eba1d8566af736fb3035029dd

    • SSDEEP

      12288:sREMc3GfziFWwrOO4pe+F3Q4/Pa6K6g+RgDNEV1850RixGs4Pi7ot:sqMqyFwrODpe+C36K6g+R6EHe0RixP4f

    • Detect ZGRat V1

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks