General

  • Target

    97764f60a073dbc9137ef79bfe1c63b8_JaffaCakes118

  • Size

    580KB

  • Sample

    240814-ypvfrswdpm

  • MD5

    97764f60a073dbc9137ef79bfe1c63b8

  • SHA1

    ebd3ca8aa2571322f413340bd8d36b8df28a5dc8

  • SHA256

    adcac50d0023e4f7103f3870fe9fc1ef9873904fcb1d7765b4ac589c0d12d47f

  • SHA512

    53b29b427721733b6fd066a98e7f3abeb84f75d56765aa5834fc00f0056118604cee3f4567e2e9bcdcd5c5cd83d6b93d339b452ead3889942396912800494cfe

  • SSDEEP

    12288:iibJ5Dd98p9c2W7X6gl8ferA/1LxPyjvekK+Z187Cklxjl1ncYv2tasGHW:z7Xn7X6gl3ra1xWvMIojJutasoW

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

XX

C2

icando.ug:6970

icacxndo.ac.ug:6970

Mutex

6SI8OkPnkxzcasd

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      97764f60a073dbc9137ef79bfe1c63b8_JaffaCakes118

    • Size

      580KB

    • MD5

      97764f60a073dbc9137ef79bfe1c63b8

    • SHA1

      ebd3ca8aa2571322f413340bd8d36b8df28a5dc8

    • SHA256

      adcac50d0023e4f7103f3870fe9fc1ef9873904fcb1d7765b4ac589c0d12d47f

    • SHA512

      53b29b427721733b6fd066a98e7f3abeb84f75d56765aa5834fc00f0056118604cee3f4567e2e9bcdcd5c5cd83d6b93d339b452ead3889942396912800494cfe

    • SSDEEP

      12288:iibJ5Dd98p9c2W7X6gl8ferA/1LxPyjvekK+Z187Cklxjl1ncYv2tasGHW:z7Xn7X6gl3ra1xWvMIojJutasoW

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks