General

  • Target

    62e7d2855d5fcfef51ebb089e4c927ba_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240521-l44lrshd92

  • MD5

    62e7d2855d5fcfef51ebb089e4c927ba

  • SHA1

    66b9c8af6cec8c97a2c27d5a85bb3dfaa4f3a238

  • SHA256

    a2e8843e56a343eb851c92463c123b06c2edc8a7c4704ec51e4ba42405cdb9b4

  • SHA512

    c6fc9221ef2f26ed20e5e97195260d7a445175f4b3c9fdb8a48c9e0c2b4d21cf0998a408261eeb976b9ef9a1867313fd5624509b5f105ca37a43546e3eeefa2f

  • SSDEEP

    24576:nB9TKWd0f53bIaRzL3OdGls5n5buo2+TntGWEzkQghh:ratbBFCbA+TcVYh

Malware Config

Targets

    • Target

      SALIKHACK/SALIKHACK.BAT

    • Size

      238B

    • MD5

      21a67af3a0e70534daf91c971545bc80

    • SHA1

      23141575d04651a2cd778a33732805c468033ef0

    • SHA256

      940dd6c2693be78a671cad250f75a5b5324b3350e2b2fc1cfc098293b934fdb3

    • SHA512

      b79f1dd26beee4a6995b0d67f112e4dff152d05822e8482579b6bdbd414b06cfbdeb6f55f4cb41d1821e6e7b98bfa3852e1d163355b3de5cd985373f8a333e66

    Score
    1/10
    • Target

      SALIKHACK/SALIKHACK.exe

    • Size

      3.1MB

    • MD5

      3be8fa0b38501cdb368c5cf5a0615880

    • SHA1

      52083abf2794b5f6f8a429ef5bf5fa552896832f

    • SHA256

      1d0c2228e4f710999bd97385b1595cd48bc9b79a837a01eff63efb470a1f92ba

    • SHA512

      4d60b1c7d41f9a03147cf1d81640d9b6cd09078c9a8e1634006f505c95cf81a3f0a2f3f31b6c925fd9c90be6c733cac7a54cadf19b0dd0b63ea2b2d8a78ea5bd

    • SSDEEP

      49152:eFnAp4kyST0QX9i41ZmCq6M+s8KuqGaX0ToIBAUZLYRXcYz7NWu22wS3BNM8:eFw7ySwQX9iC4n0JBAUZLuMYz1BN

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Poullight

      Poullight is an information stealer first seen in March 2020.

    • Poullight Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks