General

  • Target

    a34ab98a46710de5f631103149c046ab_JaffaCakes118

  • Size

    176KB

  • Sample

    240613-bfst9asbql

  • MD5

    a34ab98a46710de5f631103149c046ab

  • SHA1

    f203b4808651208c19182817ecd387ccbc4d7349

  • SHA256

    cc2116a99fd714ca55a707bdb636f16e946d75699356bcd5ffad859ad852bac9

  • SHA512

    f8f67c1af0fd69cc710552e428509f7116ec8444f0ca8330869ea7460830f1da5e79868178f1f02608daa9ae7e8ffb5fcedd271d3596367d68f09591c83704da

  • SSDEEP

    3072:Rf5pa1IWNm0Ym+CXwn4jNOkT7epaVzPXuYv2DnI57EjDfsM2cBz5C:pa1IFU+Bn4jspYtv2DnNjjsM2cJ4

Malware Config

Extracted

Family

mylobot

C2

fywkuzp.ru:7432

zdrussle.ru:2173

pseyumd.ru:5492

stydodo.ru:2619

tqzknrx.com:1123

mdcqrxw.com:4984

tpwtgyw.com:9631

cnoyucn.com:9426

qhloury.com:4759

fnjxpwy.com:3863

csxpzlz.com:5778

wlkjopy.com:8778

mynfwwk.com:8427

uuitwxg.com:6656

agnxomu.com:8881

wcagsib.com:3547

fmniltb.com:9582

oapwxiu.com:3922

petrrry.com:7531

poubauo.com:4623

Targets

    • Target

      a34ab98a46710de5f631103149c046ab_JaffaCakes118

    • Size

      176KB

    • MD5

      a34ab98a46710de5f631103149c046ab

    • SHA1

      f203b4808651208c19182817ecd387ccbc4d7349

    • SHA256

      cc2116a99fd714ca55a707bdb636f16e946d75699356bcd5ffad859ad852bac9

    • SHA512

      f8f67c1af0fd69cc710552e428509f7116ec8444f0ca8330869ea7460830f1da5e79868178f1f02608daa9ae7e8ffb5fcedd271d3596367d68f09591c83704da

    • SSDEEP

      3072:Rf5pa1IWNm0Ym+CXwn4jNOkT7epaVzPXuYv2DnI57EjDfsM2cBz5C:pa1IFU+Bn4jspYtv2DnNjjsM2cJ4

    • Mylobot

      Botnet which first appeared in 2017 written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks