General

  • Target

    e4941baa85eb625dc69f284160390a1e_JaffaCakes118

  • Size

    11.1MB

  • Sample

    240916-mklsaaseqa

  • MD5

    e4941baa85eb625dc69f284160390a1e

  • SHA1

    97ce361df1c0b4c7208c817fe928b7a52e3a426b

  • SHA256

    4ed1992d19312d2ad9a77f3b4953295f72a1711b8ae397b2f28bbb30f9c5a705

  • SHA512

    d2fafe4b39fa3e5d56f5de9adef3ddc16fd4dd9102849114b1a9e4df7c51005b90b3ad7e49d3e8687f78b40b068f8b7ea260e0dd51019f5c4dffa31cabd5d48b

  • SSDEEP

    196608:54dxbzckcszEJrVnw/RmU8VCOVnUB52BL+4vsN4G8uAhc4/fH5BXysTfMJq:Wn3ckFEJrK/RmU8VCOVUl4vkU/Xv3

Malware Config

Targets

    • Target

      e4941baa85eb625dc69f284160390a1e_JaffaCakes118

    • Size

      11.1MB

    • MD5

      e4941baa85eb625dc69f284160390a1e

    • SHA1

      97ce361df1c0b4c7208c817fe928b7a52e3a426b

    • SHA256

      4ed1992d19312d2ad9a77f3b4953295f72a1711b8ae397b2f28bbb30f9c5a705

    • SHA512

      d2fafe4b39fa3e5d56f5de9adef3ddc16fd4dd9102849114b1a9e4df7c51005b90b3ad7e49d3e8687f78b40b068f8b7ea260e0dd51019f5c4dffa31cabd5d48b

    • SSDEEP

      196608:54dxbzckcszEJrVnw/RmU8VCOVnUB52BL+4vsN4G8uAhc4/fH5BXysTfMJq:Wn3ckFEJrK/RmU8VCOVUl4vkU/Xv3

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks