General

  • Target

    56087c3b2cfbffe4b6f785baec0f006f_JaffaCakes118

  • Size

    98KB

  • Sample

    240518-we39tafe8t

  • MD5

    56087c3b2cfbffe4b6f785baec0f006f

  • SHA1

    b4762a5fd443ccca31d78c0cf045aa3999e85a82

  • SHA256

    a9dad966a82b5da0b31064ff0a5584331608998c278fc8466e140a0993ff52e9

  • SHA512

    7abf4ad947d828e0c053421175af61cf10879aa7e8801240b89278f1e75a239e711a46254e2504db5941dad0319593ea8c77abeb75410d6045ee79aa9df4c382

  • SSDEEP

    1536:cTXB+5p3Bi+HpM4tmJIxqG0/7vd8xUxPpZzmbOcVf2nxqG0/7vdnA:cTs3BxJNmJIxqdLdT/ZzmKZxqdLdA

Malware Config

Targets

    • Target

      56087c3b2cfbffe4b6f785baec0f006f_JaffaCakes118

    • Size

      98KB

    • MD5

      56087c3b2cfbffe4b6f785baec0f006f

    • SHA1

      b4762a5fd443ccca31d78c0cf045aa3999e85a82

    • SHA256

      a9dad966a82b5da0b31064ff0a5584331608998c278fc8466e140a0993ff52e9

    • SHA512

      7abf4ad947d828e0c053421175af61cf10879aa7e8801240b89278f1e75a239e711a46254e2504db5941dad0319593ea8c77abeb75410d6045ee79aa9df4c382

    • SSDEEP

      1536:cTXB+5p3Bi+HpM4tmJIxqG0/7vd8xUxPpZzmbOcVf2nxqG0/7vdnA:cTs3BxJNmJIxqdLdT/ZzmKZxqdLdA

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks