General

  • Target

    dc5cc070ea662794f72b8558bddf60f9_JaffaCakes118

  • Size

    5.8MB

  • Sample

    240912-qv4ydsxbpj

  • MD5

    dc5cc070ea662794f72b8558bddf60f9

  • SHA1

    ac7ff04ac89320a84be6f853191432a707d8181a

  • SHA256

    3863361341fb271b432545c1806ea5444408bee164e18402b7b0d153c5cd4710

  • SHA512

    152a317c81ec450a95781f74bc16563b2f9c564c3778f3b2cf9418cb7906da310647a84855d160af3069171336bb287a0b19c3d9b24038e2352762f61036ae5a

  • SSDEEP

    98304:VanGfmTCkplMq4lAyurFzSyjjksnldSQmT4PU7MHT4PU7M9gN/YhGdwf:VanjALurZSyS/gN/IGOf

Malware Config

Targets

    • Target

      dc5cc070ea662794f72b8558bddf60f9_JaffaCakes118

    • Size

      5.8MB

    • MD5

      dc5cc070ea662794f72b8558bddf60f9

    • SHA1

      ac7ff04ac89320a84be6f853191432a707d8181a

    • SHA256

      3863361341fb271b432545c1806ea5444408bee164e18402b7b0d153c5cd4710

    • SHA512

      152a317c81ec450a95781f74bc16563b2f9c564c3778f3b2cf9418cb7906da310647a84855d160af3069171336bb287a0b19c3d9b24038e2352762f61036ae5a

    • SSDEEP

      98304:VanGfmTCkplMq4lAyurFzSyjjksnldSQmT4PU7MHT4PU7M9gN/YhGdwf:VanjALurZSyS/gN/IGOf

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks