General

  • Target

    9ca01142589187736ef32d73d28973e0_JaffaCakes118

  • Size

    496KB

  • Sample

    240611-b7bp2szaqf

  • MD5

    9ca01142589187736ef32d73d28973e0

  • SHA1

    307faa96f8186c56e8f670860190e08129d43b5b

  • SHA256

    ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb

  • SHA512

    9ad4906cd5ac83dbcbbe2bf875eb196ddc82d423ddc58c92feb44039d1f0620bfc26ba330eb4afd31d3a14d8094fb21ba30beb6ceba8f5980cf82e59252332de

  • SSDEEP

    12288:bA+j5BXJPJGMw75VGB7SLCY1J1kGl8V3eZsemDhkJp:0qHJhGrVG96r1/kGlVZshDhwp

Malware Config

Targets

    • Target

      9ca01142589187736ef32d73d28973e0_JaffaCakes118

    • Size

      496KB

    • MD5

      9ca01142589187736ef32d73d28973e0

    • SHA1

      307faa96f8186c56e8f670860190e08129d43b5b

    • SHA256

      ac9fec69ac45137f4fc44b568af643e9dc34724e8a110d1f028650fe8e5914bb

    • SHA512

      9ad4906cd5ac83dbcbbe2bf875eb196ddc82d423ddc58c92feb44039d1f0620bfc26ba330eb4afd31d3a14d8094fb21ba30beb6ceba8f5980cf82e59252332de

    • SSDEEP

      12288:bA+j5BXJPJGMw75VGB7SLCY1J1kGl8V3eZsemDhkJp:0qHJhGrVG96r1/kGlVZshDhwp

    • Kutaki

      Information stealer and keylogger that hides inside legitimate Visual Basic applications.

    • Kutaki Executable

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks