General

  • Target

    075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118

  • Size

    274KB

  • Sample

    240620-s3jcrsvena

  • MD5

    075eba5b9f7b51def6b42501bcf35d75

  • SHA1

    d29b1756601f6661987b82d6ec3f6332bffdc980

  • SHA256

    3cbafe791bae6936e83c36aee30c84b36d9e236d1fecb829d470392f53b17472

  • SHA512

    2d6519340bb03c209531e6b7e311bc19196127a02e8592bc12b6ee05dbf1b4e37cfd726465f5026fad6a8e5dda0e7bad4ec7b74fababb90fb3e6e3adb517fa97

  • SSDEEP

    6144:rWYZ2KZGRhEbStJT3FlZZmUFYn9gEQymEJc33nK3XXH7B9qA:rZ2ROWJzFlZZmt9gEqEynUXr

Malware Config

Targets

    • Target

      075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118

    • Size

      274KB

    • MD5

      075eba5b9f7b51def6b42501bcf35d75

    • SHA1

      d29b1756601f6661987b82d6ec3f6332bffdc980

    • SHA256

      3cbafe791bae6936e83c36aee30c84b36d9e236d1fecb829d470392f53b17472

    • SHA512

      2d6519340bb03c209531e6b7e311bc19196127a02e8592bc12b6ee05dbf1b4e37cfd726465f5026fad6a8e5dda0e7bad4ec7b74fababb90fb3e6e3adb517fa97

    • SSDEEP

      6144:rWYZ2KZGRhEbStJT3FlZZmUFYn9gEQymEJc33nK3XXH7B9qA:rZ2ROWJzFlZZmt9gEqEynUXr

    • Modifies security service

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks