General

  • Target

    093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118

  • Size

    179KB

  • Sample

    240624-shlbmasajq

  • MD5

    093aa4289d9d8d8315ab0ea9b306f0a0

  • SHA1

    0316c6e558148a10d0acf63bc84f53ca315b1acf

  • SHA256

    39f7abd459bda03744d7d1dfb7dd15b2204014d75f20d86a13789648d6f44b1d

  • SHA512

    ddea7839a14759a27d17578850fb473f720bf911cb9d6e56c3e55a963eca51a85ae1706d2f8bca31b216fa7ef2457135dd1a198008203e6635cb73fd3df985f8

  • SSDEEP

    3072:+p1gHeX3reXqf6ZKOBRY+7Q0bamKZtvEzKbURCqeGK/6SbIpklgVDSxGfmuZyas:+p1gHeX3reXqf6ZKwRY+cM24RCqeGKZR

Malware Config

Targets

    • Target

      093aa4289d9d8d8315ab0ea9b306f0a0_JaffaCakes118

    • Size

      179KB

    • MD5

      093aa4289d9d8d8315ab0ea9b306f0a0

    • SHA1

      0316c6e558148a10d0acf63bc84f53ca315b1acf

    • SHA256

      39f7abd459bda03744d7d1dfb7dd15b2204014d75f20d86a13789648d6f44b1d

    • SHA512

      ddea7839a14759a27d17578850fb473f720bf911cb9d6e56c3e55a963eca51a85ae1706d2f8bca31b216fa7ef2457135dd1a198008203e6635cb73fd3df985f8

    • SSDEEP

      3072:+p1gHeX3reXqf6ZKOBRY+7Q0bamKZtvEzKbURCqeGK/6SbIpklgVDSxGfmuZyas:+p1gHeX3reXqf6ZKwRY+cM24RCqeGKZR

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • WSHRAT payload

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks