General

  • Target

    947faae9a187de71788815724f571819_JaffaCakes118

  • Size

    1.0MB

  • Sample

    240813-ykhleashpa

  • MD5

    947faae9a187de71788815724f571819

  • SHA1

    5fe537306aa15a4b4ace027a96865b3f5fd669c4

  • SHA256

    be5a69860496aee1872f72b2e49ccfe63d64e234370ccd2dbe4a27400982f9f1

  • SHA512

    52e97e0e5e5ea8de21eb5225d7e72e559dcf75b6417e497c9cdbdd0df50cfe22b42d5f384ce3746c8a15f68b1252c237880e9edda1809b022a1bde19ad104cb0

  • SSDEEP

    24576:0VixfhAJZ/PpmM7OnBegeO3vAaqs4wROP8H4wcjIbsEeyqGFsjo0z3LN:0ViMJdgMKY0vAXsXRuwdZq9jo8N

Malware Config

Targets

    • Target

      Sunday Crypted.jar.jar

    • Size

      1.0MB

    • MD5

      648b01fc2ce4eda44b27ea23c3476ea4

    • SHA1

      9a85fff8a0e6e70aed3262fcb1c8bcf250e88477

    • SHA256

      84c2a9812d440d32ed25b629b66d74e540ee1bc74678e030d95cdff17c6af0d3

    • SHA512

      fa573477cf84b6f3e22ff905c0892e74069c7a0fde1d2397508d15cfe3515e375cbcd5a582888cecec0aa84e118ad1ae93148930da8a8649b123f78e0b649e09

    • SSDEEP

      24576:aJKnxFuJZ7PnUanOFBaIQKNvyac+SwpON89Gm8DCfso+C8GNsjC033La:aJK+JZ8aOS8vyR+BpGm1F8vjC+a

    • AdWind

      A Java-based RAT family operated as malware-as-a-service.

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks