General

  • Target

    c19b56884372973a458fb9f3fb809722_JaffaCakes118

  • Size

    2.3MB

  • Sample

    240825-z6hc7sxclj

  • MD5

    c19b56884372973a458fb9f3fb809722

  • SHA1

    bd009f2aca97aaed002beadce7afbc449c107e4d

  • SHA256

    ae6b4473f53666e39edab08c5865b1778b27becac24fac714f4bffee0b4ed475

  • SHA512

    160b19be283422cb47ae15386b673b0af016f5bb93ffd382fd4dd26c9ee2d38623569c86d5872a39eba22d26f3f3deb3ce87733d557b26546e5d2859ade80af2

  • SSDEEP

    49152:ydyOtceaBv0ZHFQTrSuYSXx5HWncDtJGR9ePUJ80Tj7dsdqSiZn+ApZkVuz:ydyEcBvWFQ1YSXx53J707dBSifkVe

Malware Config

Targets

    • Target

      Po2865-16-CD1.exe

    • Size

      2.4MB

    • MD5

      77914c7c55fea8133e89f9cd8ffa551b

    • SHA1

      5a23d06d72f5498c34c692624472ad32a3c97d3a

    • SHA256

      84c48a6fb8c37c190eab05a96a98432a175dba7ff9f6853d6b91e260481bf2df

    • SHA512

      31a39168c7d58fd66db4cee361aacd4986b49af2450e1b8c63caa95eccd2355acd1eba722b0208d52f9cde0029d98af78208a809ed4a73f33c52c4ec3a69f250

    • SSDEEP

      49152:IyCUpqemBrMxxniTruyASH1hZWJ61fFEfHOvUHuApND72nq+ilMQc+O/Zi/+f:IyCEq1rWni5ASH1/t51An7f+i2QQi/c

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks