General

  • Target

    6f48473b2ff43d674687d0fba4e06721_JaffaCakes118

  • Size

    715KB

  • Sample

    240725-m1swjaxfkg

  • MD5

    6f48473b2ff43d674687d0fba4e06721

  • SHA1

    a9f0c2063728bc11d0eb321ae8ce5d503dd2587b

  • SHA256

    e7c894a44a2c709578f3eeb8f50c4f34c092aa0621272bba6e7b94cd8988cfc6

  • SHA512

    2eb92ec799a6639608ebac993ad50b7f6275b1344501e793c693f2ab7fe71f02446126b56201433f8b8b5aa50337c79ef4e6d78d908925c6198d61858f10bb59

  • SSDEEP

    12288:vaOuc4nXVcsgJugR5lPtkhRBCTaTaW8m6Da5nE1A0hc3g17AO0I8Wt6fZL:CQsXOsyXTtkRsC6a21AIAqL6BL

Malware Config

Targets

    • Target

      6f48473b2ff43d674687d0fba4e06721_JaffaCakes118

    • Size

      715KB

    • MD5

      6f48473b2ff43d674687d0fba4e06721

    • SHA1

      a9f0c2063728bc11d0eb321ae8ce5d503dd2587b

    • SHA256

      e7c894a44a2c709578f3eeb8f50c4f34c092aa0621272bba6e7b94cd8988cfc6

    • SHA512

      2eb92ec799a6639608ebac993ad50b7f6275b1344501e793c693f2ab7fe71f02446126b56201433f8b8b5aa50337c79ef4e6d78d908925c6198d61858f10bb59

    • SSDEEP

      12288:vaOuc4nXVcsgJugR5lPtkhRBCTaTaW8m6Da5nE1A0hc3g17AO0I8Wt6fZL:CQsXOsyXTtkRsC6a21AIAqL6BL

    • Ammyy Admin

      Remote admin tool with various capabilities.

    • AmmyyAdmin payload

    • FlawedAmmyy RAT

      Remote-access trojan based on leaked code for the Ammyy remote admin software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks