General

  • Target

    45952549fd27f41cbcd2a4ad44331c59_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240729-paa9xasakh

  • MD5

    45952549fd27f41cbcd2a4ad44331c59

  • SHA1

    2f512789784d8940bf63d8092d3c6f686cc50387

  • SHA256

    1a198ecee66fc8ec13774ac287557d82678d9b2a2f0192f9b180cc046840a36a

  • SHA512

    c6fa1f76ee6cbdc06df20f0c7c8ef161132f3c241ad8bde349f9d28818675d7dd4b321223c5ea00e55c975a3279a8da29fed7cc856ad5290f855aa7af6a044da

  • SSDEEP

    49152:LYBmOuoX4kn2po7rdrhNu5HjHyQhojw8p/R3nsQ7ra3oF6QlNWOJOcUr:LYBmOWJ2SJo3NsQkoPoOJM

Malware Config

Targets

    • Target

      45952549fd27f41cbcd2a4ad44331c59_JaffaCakes118

    • Size

      2.2MB

    • MD5

      45952549fd27f41cbcd2a4ad44331c59

    • SHA1

      2f512789784d8940bf63d8092d3c6f686cc50387

    • SHA256

      1a198ecee66fc8ec13774ac287557d82678d9b2a2f0192f9b180cc046840a36a

    • SHA512

      c6fa1f76ee6cbdc06df20f0c7c8ef161132f3c241ad8bde349f9d28818675d7dd4b321223c5ea00e55c975a3279a8da29fed7cc856ad5290f855aa7af6a044da

    • SSDEEP

      49152:LYBmOuoX4kn2po7rdrhNu5HjHyQhojw8p/R3nsQ7ra3oF6QlNWOJOcUr:LYBmOWJ2SJo3NsQkoPoOJM

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • BitRAT payload

    • Modifies WinLogon for persistence

    • Drops startup file

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks