General

  • Target

    dc94d88ee916de48153c4ce1944495ff_JaffaCakes118

  • Size

    200KB

  • Sample

    240912-tme6vashrr

  • MD5

    dc94d88ee916de48153c4ce1944495ff

  • SHA1

    210675e4bb0eedf2d927330c0d41e2cd37a4215f

  • SHA256

    fede4c902d9c0333b30d24922c4c504704c4a8dfad5f7acf24ffd37076d03fca

  • SHA512

    68dfc69c88c0a9d3441fbd268800ded716e6bcda767c5ce5a7b34c39055cda0decc008b247f6720950352a75259013ed226910f52c4eb1ec66ccf80acf796623

  • SSDEEP

    3072:wXh8VGYR5ASPRElbLwOKKmRVQhOcAhYKMcgwgXFu7GqaX:wXCVGrS5iLwOrUVQscARUw8Fu76

Malware Config

Targets

    • Target

      dc94d88ee916de48153c4ce1944495ff_JaffaCakes118

    • Size

      200KB

    • MD5

      dc94d88ee916de48153c4ce1944495ff

    • SHA1

      210675e4bb0eedf2d927330c0d41e2cd37a4215f

    • SHA256

      fede4c902d9c0333b30d24922c4c504704c4a8dfad5f7acf24ffd37076d03fca

    • SHA512

      68dfc69c88c0a9d3441fbd268800ded716e6bcda767c5ce5a7b34c39055cda0decc008b247f6720950352a75259013ed226910f52c4eb1ec66ccf80acf796623

    • SSDEEP

      3072:wXh8VGYR5ASPRElbLwOKKmRVQhOcAhYKMcgwgXFu7GqaX:wXCVGrS5iLwOrUVQscARUw8Fu76

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks