General

  • Target

    68fbdc16f41ce5e12348bf585fbbd5a6_JaffaCakes118

  • Size

    4.3MB

  • Sample

    240522-3cmbvada25

  • MD5

    68fbdc16f41ce5e12348bf585fbbd5a6

  • SHA1

    e76004f0e214a3a7daa7387399370574b6cc5be4

  • SHA256

    5ac10df38385d1589be401ce9c2cdeb7d4a8f9675e504be283052e42d2c45f47

  • SHA512

    fe6d42acd0645e1cae636add9c0da6b057baa506f60fc8202ea6e058d9e7ff308423e4067408ab75dd1113798a19534b5a485683d79c78eb64ada71c525db95e

  • SSDEEP

    98304:aqSh5zRZwYeMMIV3PsU6Z8y6TaOphYLYSHinQpUt/YV5DyzFf:ajHYOpCm/s9y

Malware Config

Targets

    • Target

      68fbdc16f41ce5e12348bf585fbbd5a6_JaffaCakes118

    • Size

      4.3MB

    • MD5

      68fbdc16f41ce5e12348bf585fbbd5a6

    • SHA1

      e76004f0e214a3a7daa7387399370574b6cc5be4

    • SHA256

      5ac10df38385d1589be401ce9c2cdeb7d4a8f9675e504be283052e42d2c45f47

    • SHA512

      fe6d42acd0645e1cae636add9c0da6b057baa506f60fc8202ea6e058d9e7ff308423e4067408ab75dd1113798a19534b5a485683d79c78eb64ada71c525db95e

    • SSDEEP

      98304:aqSh5zRZwYeMMIV3PsU6Z8y6TaOphYLYSHinQpUt/YV5DyzFf:ajHYOpCm/s9y

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks