General

  • Target

    82286b25e730481190cc5f04f031aef7_JaffaCakes118

  • Size

    2.1MB

  • Sample

    240529-2dvtyacc4v

  • MD5

    82286b25e730481190cc5f04f031aef7

  • SHA1

    524b78c4688e8f0cb8de9c24544fcfd9d2bcd125

  • SHA256

    57a17610fd55789182c76732559d239a0d4f08804b822a82bec30d03841db2c1

  • SHA512

    5b8c2461a89d54e106d9d2ad6dc47ef0b7eb62ed6c4dbc954747650ba88a6e5264c04e2858eca4d4f9932f60bebf78c05d65f6d516163e71b47278f487dc54d1

  • SSDEEP

    49152:ldd3sWWErnngnnnKnanzO0q1cDuCOdA79DConDB393mOsT+l3SikUKVD:DWriPdA5DC+DB39W5Xi8VD

Malware Config

Targets

    • Target

      82286b25e730481190cc5f04f031aef7_JaffaCakes118

    • Size

      2.1MB

    • MD5

      82286b25e730481190cc5f04f031aef7

    • SHA1

      524b78c4688e8f0cb8de9c24544fcfd9d2bcd125

    • SHA256

      57a17610fd55789182c76732559d239a0d4f08804b822a82bec30d03841db2c1

    • SHA512

      5b8c2461a89d54e106d9d2ad6dc47ef0b7eb62ed6c4dbc954747650ba88a6e5264c04e2858eca4d4f9932f60bebf78c05d65f6d516163e71b47278f487dc54d1

    • SSDEEP

      49152:ldd3sWWErnngnnnKnanzO0q1cDuCOdA79DConDB393mOsT+l3SikUKVD:DWriPdA5DC+DB39W5Xi8VD

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks