General

  • Target

    a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118

  • Size

    63KB

  • Sample

    240818-etqhtsvcrf

  • MD5

    a557de82fdad4cc4843ec47f0d634f42

  • SHA1

    5a99193e805d721d8c44defd5400f32bbf953589

  • SHA256

    346d7b5529da0259174fa23b7dab626c3c61852e0d177048f8806a6e5f4f1902

  • SHA512

    1469ee3f321b02702ac94f7cb799e40cdd471611cbc85d18fec045384d50d34fccfbbde94c7d015c2119c4111e1e9bc91a950df7b530b9941eb7107400e6125b

  • SSDEEP

    768:pLg70B0Xz+M0pb5wXuqAR1Y+u4FxgxunyhmL+WPi0H1iUYstg7Q1TTGfL:pLg70KuqHH4jZHUhPQ1E

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    griptoloji
  • Password:
    741852

Targets

    • Target

      a557de82fdad4cc4843ec47f0d634f42_JaffaCakes118

    • Size

      63KB

    • MD5

      a557de82fdad4cc4843ec47f0d634f42

    • SHA1

      5a99193e805d721d8c44defd5400f32bbf953589

    • SHA256

      346d7b5529da0259174fa23b7dab626c3c61852e0d177048f8806a6e5f4f1902

    • SHA512

      1469ee3f321b02702ac94f7cb799e40cdd471611cbc85d18fec045384d50d34fccfbbde94c7d015c2119c4111e1e9bc91a950df7b530b9941eb7107400e6125b

    • SSDEEP

      768:pLg70B0Xz+M0pb5wXuqAR1Y+u4FxgxunyhmL+WPi0H1iUYstg7Q1TTGfL:pLg70KuqHH4jZHUhPQ1E

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks