General

  • Target

    73acea44fbbe0c1fc2e5590e377df9c6_JaffaCakes118

  • Size

    276KB

  • Sample

    240726-mkf7ssvhjb

  • MD5

    73acea44fbbe0c1fc2e5590e377df9c6

  • SHA1

    43bd62fe3189f5694156ca93fcf8bb10f0148f54

  • SHA256

    bcf21b35c9471c18119fe024c10025e24f7ae762dec72d9fe752975f19e957fd

  • SHA512

    b8b58b4d9f8033ce63ef45d0e94e0849e41c7852a0ae2c2131b1a37370dc70c63dd4db4e2e3b3c5ef21da08e5c4dd185df488bd34e42170278a8c37f237bfd2e

  • SSDEEP

    6144:NX4i4Zs/ON7CJVFJRwAGRtS2wWAgZzc0kq/pe9Ijm:NjWZE7JRotSC120cM

Malware Config

Targets

    • Target

      73acea44fbbe0c1fc2e5590e377df9c6_JaffaCakes118

    • Size

      276KB

    • MD5

      73acea44fbbe0c1fc2e5590e377df9c6

    • SHA1

      43bd62fe3189f5694156ca93fcf8bb10f0148f54

    • SHA256

      bcf21b35c9471c18119fe024c10025e24f7ae762dec72d9fe752975f19e957fd

    • SHA512

      b8b58b4d9f8033ce63ef45d0e94e0849e41c7852a0ae2c2131b1a37370dc70c63dd4db4e2e3b3c5ef21da08e5c4dd185df488bd34e42170278a8c37f237bfd2e

    • SSDEEP

      6144:NX4i4Zs/ON7CJVFJRwAGRtS2wWAgZzc0kq/pe9Ijm:NjWZE7JRotSC120cM

    • Modifies WinLogon for persistence

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials from Password Stores

1
T1555

Credentials from Web Browsers

1
T1555.003

Unsecured Credentials

3
T1552

Credentials In Files

3
T1552.001

Discovery

Query Registry

1
T1012

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Collection

Data from Local System

2
T1005

Tasks