General

  • Target

    2c2bd06b621c687498b4dc180d396310_JaffaCakes118

  • Size

    784KB

  • Sample

    240708-nmst2sygrc

  • MD5

    2c2bd06b621c687498b4dc180d396310

  • SHA1

    f23d366641cce0768de31f9cc7654edca9050d44

  • SHA256

    993eb1738b0dfe8dc45c7fbc6ae708bcfb9d7715c1b7af9c76607f37d2b78439

  • SHA512

    fcbd9111528c0955b7b8aee7cd38d1b8f6a86c77c62c5e9008821e2acf6193e4089e1fedcabfe8e3fbab016c8b118e104b1d13beca5d053c97e110a8bb882fd5

  • SSDEEP

    12288:dHRN2V/TP2Wh43o4rroMjXfziLW8uJgtoPS038JvQIvJbxHBjGtU:dHaVrPb43ogrrsO9Ke8lQ0DhQ

Score
10/10
upx

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    alexadnr2.vov.ru
  • Port:
    21
  • Username:
    u321656
  • Password:
    b4decmia

Targets

    • Target

      2c2bd06b621c687498b4dc180d396310_JaffaCakes118

    • Size

      784KB

    • MD5

      2c2bd06b621c687498b4dc180d396310

    • SHA1

      f23d366641cce0768de31f9cc7654edca9050d44

    • SHA256

      993eb1738b0dfe8dc45c7fbc6ae708bcfb9d7715c1b7af9c76607f37d2b78439

    • SHA512

      fcbd9111528c0955b7b8aee7cd38d1b8f6a86c77c62c5e9008821e2acf6193e4089e1fedcabfe8e3fbab016c8b118e104b1d13beca5d053c97e110a8bb882fd5

    • SSDEEP

      12288:dHRN2V/TP2Wh43o4rroMjXfziLW8uJgtoPS038JvQIvJbxHBjGtU:dHaVrPb43ogrrsO9Ke8lQ0DhQ

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks