General

  • Target

    047a9bf43f7fa71e84e8cf42e32fa62a_JaffaCakes118

  • Size

    194KB

  • Sample

    240620-krzavashlk

  • MD5

    047a9bf43f7fa71e84e8cf42e32fa62a

  • SHA1

    b7839b2fa7190d129a741b12bfcb8ee37fec8626

  • SHA256

    608593fcf6d4c4388f0b8dd2e6e127b101823b688301b1fbdaf49b8c0f9b4ec0

  • SHA512

    83db3717907252b69f69e3bed19daa462e5a30484a7b8d9ba7acdcc372da1724de520a112c71176276360a7ab3a332e670d0f680214f93cfda7927c98d3d1234

  • SSDEEP

    6144:zVpLfZcN/uOzP2N/L7RI++KOw9puou2DY:xOz2P0KxDDY

Malware Config

Targets

    • Target

      047a9bf43f7fa71e84e8cf42e32fa62a_JaffaCakes118

    • Size

      194KB

    • MD5

      047a9bf43f7fa71e84e8cf42e32fa62a

    • SHA1

      b7839b2fa7190d129a741b12bfcb8ee37fec8626

    • SHA256

      608593fcf6d4c4388f0b8dd2e6e127b101823b688301b1fbdaf49b8c0f9b4ec0

    • SHA512

      83db3717907252b69f69e3bed19daa462e5a30484a7b8d9ba7acdcc372da1724de520a112c71176276360a7ab3a332e670d0f680214f93cfda7927c98d3d1234

    • SSDEEP

      6144:zVpLfZcN/uOzP2N/L7RI++KOw9puou2DY:xOz2P0KxDDY

    • Modifies Windows Firewall

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks