General

  • Target

    d2a03d36e475d3f29acc6ebbf0dea681_JaffaCakes118

  • Size

    3.9MB

  • Sample

    240907-xmgapayhmr

  • MD5

    d2a03d36e475d3f29acc6ebbf0dea681

  • SHA1

    c5323feb939c8e091936657d85e5037fe7fff9c9

  • SHA256

    c44235ae776337bdafbcfad3dd1a18980d8196ffd0d83b47c449add450c31306

  • SHA512

    990476b10565d7b9429f3e9c485e49883df3addd2c1dd92b0640d63375c7e289e8af741bf4ce7c119272a5b512fbd618210fd243fea5824d4114a5974dbefb8b

  • SSDEEP

    98304:gXNvomMQgWv3OWFqw0CFChs6qCTbzeumUvrDsTLyYDH/tN7A:aNdFv3b/X0i6qCTfVmUHoz/tNA

Malware Config

Targets

    • Target

      d2a03d36e475d3f29acc6ebbf0dea681_JaffaCakes118

    • Size

      3.9MB

    • MD5

      d2a03d36e475d3f29acc6ebbf0dea681

    • SHA1

      c5323feb939c8e091936657d85e5037fe7fff9c9

    • SHA256

      c44235ae776337bdafbcfad3dd1a18980d8196ffd0d83b47c449add450c31306

    • SHA512

      990476b10565d7b9429f3e9c485e49883df3addd2c1dd92b0640d63375c7e289e8af741bf4ce7c119272a5b512fbd618210fd243fea5824d4114a5974dbefb8b

    • SSDEEP

      98304:gXNvomMQgWv3OWFqw0CFChs6qCTbzeumUvrDsTLyYDH/tN7A:aNdFv3b/X0i6qCTfVmUHoz/tNA

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks