General

  • Target

    b629269e9829b472ed927904df3354f3_JaffaCakes118

  • Size

    401KB

  • Sample

    240822-dxeeaswdjg

  • MD5

    b629269e9829b472ed927904df3354f3

  • SHA1

    a3ca20208cd60c2b5f4b57752ce0d46d97b514a2

  • SHA256

    8780d933fff34c8ae4dc767b5fccffecc1d91c59d5f20d0a102de520e5c09637

  • SHA512

    3a0c04f87062471f1a3418ce86529c93f6447751e39f7b14068c4b64a01fc7fe33461f765fcf9839214e18b56540a256c80715de3a22d885d7c93d04e6ee5e01

  • SSDEEP

    6144:d6lI748r+v3dbiVO93PeTw+7GZJUoMohoHYIYjoVomoEoUoRocENHRgPvSCsDr3h:gk9XVO9277LYIYsVRSHsDrR

Malware Config

Targets

    • Target

      b629269e9829b472ed927904df3354f3_JaffaCakes118

    • Size

      401KB

    • MD5

      b629269e9829b472ed927904df3354f3

    • SHA1

      a3ca20208cd60c2b5f4b57752ce0d46d97b514a2

    • SHA256

      8780d933fff34c8ae4dc767b5fccffecc1d91c59d5f20d0a102de520e5c09637

    • SHA512

      3a0c04f87062471f1a3418ce86529c93f6447751e39f7b14068c4b64a01fc7fe33461f765fcf9839214e18b56540a256c80715de3a22d885d7c93d04e6ee5e01

    • SSDEEP

      6144:d6lI748r+v3dbiVO93PeTw+7GZJUoMohoHYIYjoVomoEoUoRocENHRgPvSCsDr3h:gk9XVO9277LYIYsVRSHsDrR

    • Modifies RDP port number used by Windows

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Remote Services: SMB/Windows Admin Shares

      Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).

MITRE ATT&CK Enterprise v15

Tasks