General

  • Target

    4928374b639d4f095102cecdb848db66_JaffaCakes118

  • Size

    361KB

  • Sample

    240715-k71tlssapa

  • MD5

    4928374b639d4f095102cecdb848db66

  • SHA1

    4604ea3ff9309de29b07bed2b3f8d2cb5a718b78

  • SHA256

    21a9b8293e9697fa7e8d4724817cc0a95cf16bb2b944b71a97f5a627d33ceb2c

  • SHA512

    48757788147e3014b9a4108941d1061f6fafed9cc6f7cac535a1ed4739d57751dba236c9440c1019c89c2be6a875b66d2736c108b2ca9d2c51cabbb309e61662

  • SSDEEP

    6144:m4i0drCKogbmqnTQQMBCj1SpdFUYvDg9+/uoUa3snYyRgPvSCsDr3rxe:m47xbzcISbFrvMM/hqYyRSHsDr9

Malware Config

Targets

    • Target

      4928374b639d4f095102cecdb848db66_JaffaCakes118

    • Size

      361KB

    • MD5

      4928374b639d4f095102cecdb848db66

    • SHA1

      4604ea3ff9309de29b07bed2b3f8d2cb5a718b78

    • SHA256

      21a9b8293e9697fa7e8d4724817cc0a95cf16bb2b944b71a97f5a627d33ceb2c

    • SHA512

      48757788147e3014b9a4108941d1061f6fafed9cc6f7cac535a1ed4739d57751dba236c9440c1019c89c2be6a875b66d2736c108b2ca9d2c51cabbb309e61662

    • SSDEEP

      6144:m4i0drCKogbmqnTQQMBCj1SpdFUYvDg9+/uoUa3snYyRgPvSCsDr3rxe:m47xbzcISbFrvMM/hqYyRSHsDr9

    • Modifies RDP port number used by Windows

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks