General

  • Target

    42e4b26357361615b96afde69a5f0cc3_JaffaCakes118

  • Size

    1002KB

  • Sample

    240514-y2gqfaed81

  • MD5

    42e4b26357361615b96afde69a5f0cc3

  • SHA1

    35346fe0787f14236296b469bf2fed5c24a1a53d

  • SHA256

    e58a07965ef711fc60ab82ac805cfc3926e105460356dbbea532ba3d9f2080eb

  • SHA512

    fb8a2f4a9f280c0e3c0bb979016c11ea217bae9cebd06f7f2b5ef7b8973b98128ebc2e5cf76b824d71b889fca4510111a79b177dab592f332131f0d6789673a5

  • SSDEEP

    24576:nKlaBa1sMMZvIniOzOhlfEZVqWjY1WvXhW:KfWL2ntzMqS1MW

Malware Config

Targets

    • Target

      42e4b26357361615b96afde69a5f0cc3_JaffaCakes118

    • Size

      1002KB

    • MD5

      42e4b26357361615b96afde69a5f0cc3

    • SHA1

      35346fe0787f14236296b469bf2fed5c24a1a53d

    • SHA256

      e58a07965ef711fc60ab82ac805cfc3926e105460356dbbea532ba3d9f2080eb

    • SHA512

      fb8a2f4a9f280c0e3c0bb979016c11ea217bae9cebd06f7f2b5ef7b8973b98128ebc2e5cf76b824d71b889fca4510111a79b177dab592f332131f0d6789673a5

    • SSDEEP

      24576:nKlaBa1sMMZvIniOzOhlfEZVqWjY1WvXhW:KfWL2ntzMqS1MW

    • Detect ZGRat V1

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks