General

  • Target

    17f8ee107d2f68c98c01fb57879f30b0_JaffaCakes118

  • Size

    4.8MB

  • Sample

    240627-3nreya1fpl

  • MD5

    17f8ee107d2f68c98c01fb57879f30b0

  • SHA1

    a3dd0810f25c4e8ba33ad4d99d987fb025189218

  • SHA256

    c676a0fe692c2f8293a660ec164efa020b3d5544d71239fd0347a3ff714a5b6f

  • SHA512

    9c454cb996858c722da26a5c9e50e83e53b9f8a28a3e8ff4739e682bb490c27051abe4dda7e99dd54bbb47b958768084cd257c4e99e270263c73d469849878b7

  • SSDEEP

    98304:9/I3Njo7b9sogJNDYl5VZ43sWx28dh7/1FgpGBOguYxScKGf+V+QB:Yo7+1slwsWx28b7Pu4+j

Malware Config

Targets

    • Target

      17f8ee107d2f68c98c01fb57879f30b0_JaffaCakes118

    • Size

      4.8MB

    • MD5

      17f8ee107d2f68c98c01fb57879f30b0

    • SHA1

      a3dd0810f25c4e8ba33ad4d99d987fb025189218

    • SHA256

      c676a0fe692c2f8293a660ec164efa020b3d5544d71239fd0347a3ff714a5b6f

    • SHA512

      9c454cb996858c722da26a5c9e50e83e53b9f8a28a3e8ff4739e682bb490c27051abe4dda7e99dd54bbb47b958768084cd257c4e99e270263c73d469849878b7

    • SSDEEP

      98304:9/I3Njo7b9sogJNDYl5VZ43sWx28dh7/1FgpGBOguYxScKGf+V+QB:Yo7+1slwsWx28b7Pu4+j

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks