General
-
Target
c19b56884372973a458fb9f3fb809722_JaffaCakes118
-
Size
2.3MB
-
Sample
240825-z6hc7sxclj
-
MD5
c19b56884372973a458fb9f3fb809722
-
SHA1
bd009f2aca97aaed002beadce7afbc449c107e4d
-
SHA256
ae6b4473f53666e39edab08c5865b1778b27becac24fac714f4bffee0b4ed475
-
SHA512
160b19be283422cb47ae15386b673b0af016f5bb93ffd382fd4dd26c9ee2d38623569c86d5872a39eba22d26f3f3deb3ce87733d557b26546e5d2859ade80af2
-
SSDEEP
49152:ydyOtceaBv0ZHFQTrSuYSXx5HWncDtJGR9ePUJ80Tj7dsdqSiZn+ApZkVuz:ydyEcBvWFQ1YSXx53J707dBSifkVe
Static task
static1
Behavioral task
behavioral1
Sample
Po2865-16-CD1.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Po2865-16-CD1.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Po2865-16-CD1.exe
-
Size
2.4MB
-
MD5
77914c7c55fea8133e89f9cd8ffa551b
-
SHA1
5a23d06d72f5498c34c692624472ad32a3c97d3a
-
SHA256
84c48a6fb8c37c190eab05a96a98432a175dba7ff9f6853d6b91e260481bf2df
-
SHA512
31a39168c7d58fd66db4cee361aacd4986b49af2450e1b8c63caa95eccd2355acd1eba722b0208d52f9cde0029d98af78208a809ed4a73f33c52c4ec3a69f250
-
SSDEEP
49152:IyCUpqemBrMxxniTruyASH1hZWJ61fFEfHOvUHuApND72nq+ilMQc+O/Zi/+f:IyCEq1rWni5ASH1/t51An7f+i2QQi/c
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1