General

  • Target

    e09ce4c6815db9a8954928be18b9e3ad_JaffaCakes118

  • Size

    4.9MB

  • Sample

    240914-vdyghavajr

  • MD5

    e09ce4c6815db9a8954928be18b9e3ad

  • SHA1

    2c82f757cf8fc537b622ae93b9bdb9cc6eebd5ef

  • SHA256

    86c220d1b73c3ed1d84330e4d34f8ddb993177da3d7e33b5de8b24a458ac7ab9

  • SHA512

    adf8296af4744b594afe5fc701b501c80886e35ad6c84a54f1f7836073b087e73b36568bac662091c1124c7d6915a1b2196c9387c02521319a1eef0dddbffd70

  • SSDEEP

    98304:A+PzP5iw0yhm0J5t8s6kheKqno3KzKWNXblVE3MlYJ4DcLIQeXRxk5oi:AQL5F0mm0nus/sKGoaOWNXbEpJ4I6k5T

Malware Config

Targets

    • Target

      e09ce4c6815db9a8954928be18b9e3ad_JaffaCakes118

    • Size

      4.9MB

    • MD5

      e09ce4c6815db9a8954928be18b9e3ad

    • SHA1

      2c82f757cf8fc537b622ae93b9bdb9cc6eebd5ef

    • SHA256

      86c220d1b73c3ed1d84330e4d34f8ddb993177da3d7e33b5de8b24a458ac7ab9

    • SHA512

      adf8296af4744b594afe5fc701b501c80886e35ad6c84a54f1f7836073b087e73b36568bac662091c1124c7d6915a1b2196c9387c02521319a1eef0dddbffd70

    • SSDEEP

      98304:A+PzP5iw0yhm0J5t8s6kheKqno3KzKWNXblVE3MlYJ4DcLIQeXRxk5oi:AQL5F0mm0nus/sKGoaOWNXbEpJ4I6k5T

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks