General

  • Target

    d0af022fcd70e40af496080bb3f2cf2f_JaffaCakes118

  • Size

    2.3MB

  • Sample

    240906-3zycmathqn

  • MD5

    d0af022fcd70e40af496080bb3f2cf2f

  • SHA1

    77c07c0f6d59901848039f1ca6fd06e82732594a

  • SHA256

    573a4ac703fcb9aff145a3d56ec9fbb34af2d260d1523858f838c4ccdb653571

  • SHA512

    9c183a1df5bea05fa163f9ed96a585ce9cd02539e5ca182ee8ace88d2588afac1ea338abe245d588d548268ecf46c3565114d87f68770a0d435ede8492498d41

  • SSDEEP

    49152:G8auGMmIIOKOMcWOBVW449tnzSj0ImqP+gXwi8N+HwXe4Uj+eBH5WQD:Gju2XJZSInGhGv+Qgj+K5Ws

Malware Config

Targets

    • Target

      d0af022fcd70e40af496080bb3f2cf2f_JaffaCakes118

    • Size

      2.3MB

    • MD5

      d0af022fcd70e40af496080bb3f2cf2f

    • SHA1

      77c07c0f6d59901848039f1ca6fd06e82732594a

    • SHA256

      573a4ac703fcb9aff145a3d56ec9fbb34af2d260d1523858f838c4ccdb653571

    • SHA512

      9c183a1df5bea05fa163f9ed96a585ce9cd02539e5ca182ee8ace88d2588afac1ea338abe245d588d548268ecf46c3565114d87f68770a0d435ede8492498d41

    • SSDEEP

      49152:G8auGMmIIOKOMcWOBVW449tnzSj0ImqP+gXwi8N+HwXe4Uj+eBH5WQD:Gju2XJZSInGhGv+Qgj+K5Ws

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • BitRAT payload

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks