General

  • Target

    e73f7e20d11ac71fd309d1c521243db1_JaffaCakes118

  • Size

    39.1MB

  • Sample

    240917-t4ddkstakk

  • MD5

    e73f7e20d11ac71fd309d1c521243db1

  • SHA1

    69d9a755f271e59606875e5b265a0be1928f0b77

  • SHA256

    3547f0bf99449bcfdef08fc20ea330ecf073fa98800f98f0074f8484e78cfa4e

  • SHA512

    a741c56740a469b890c18f565edcbb467072886900e0f14da3f8516db1298fb80db2550423bf2aa718eaaa73607b38bbcd7acbac7ed47726ca687beed6ff1519

  • SSDEEP

    786432:tj5TtWVsa9GGs1Size1GgV1r4R49EuJvgH6KOhwafyk/V/JC3jh46E04DGkd:ptkVsasfyN2R49EuJ26KOhwaf23jJO7

Malware Config

Targets

    • Target

      e73f7e20d11ac71fd309d1c521243db1_JaffaCakes118

    • Size

      39.1MB

    • MD5

      e73f7e20d11ac71fd309d1c521243db1

    • SHA1

      69d9a755f271e59606875e5b265a0be1928f0b77

    • SHA256

      3547f0bf99449bcfdef08fc20ea330ecf073fa98800f98f0074f8484e78cfa4e

    • SHA512

      a741c56740a469b890c18f565edcbb467072886900e0f14da3f8516db1298fb80db2550423bf2aa718eaaa73607b38bbcd7acbac7ed47726ca687beed6ff1519

    • SSDEEP

      786432:tj5TtWVsa9GGs1Size1GgV1r4R49EuJvgH6KOhwafyk/V/JC3jh46E04DGkd:ptkVsasfyN2R49EuJ26KOhwaf23jJO7

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks