General

  • Target

    e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118

  • Size

    1.8MB

  • Sample

    240918-pmqv5a1hnj

  • MD5

    e91cc94bcf70a4cd3a8f8c7df1bf88fa

  • SHA1

    2ac449ecfca9d525b8b65da6c47a5525c0fe48b9

  • SHA256

    014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f

  • SHA512

    964dc41bbd55e571562f2c2d7f8c738efb1b31a9ff69d153d8e1af6c435080da65712641bbe7a69d5effff1a0defa20ebdf81670c7260ce3c5b590c09a4cb0c1

  • SSDEEP

    49152:GLftJlJ+XnNHogttWcDRzOEtZuFno0ezgLMF1MSR4aK7:ItihoEtWsgSY5vHMES6aK7

Malware Config

Extracted

Family

buer

C2

http://bbload01.top/

http://bbload02.top/

Targets

    • Target

      e91cc94bcf70a4cd3a8f8c7df1bf88fa_JaffaCakes118

    • Size

      1.8MB

    • MD5

      e91cc94bcf70a4cd3a8f8c7df1bf88fa

    • SHA1

      2ac449ecfca9d525b8b65da6c47a5525c0fe48b9

    • SHA256

      014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f

    • SHA512

      964dc41bbd55e571562f2c2d7f8c738efb1b31a9ff69d153d8e1af6c435080da65712641bbe7a69d5effff1a0defa20ebdf81670c7260ce3c5b590c09a4cb0c1

    • SSDEEP

      49152:GLftJlJ+XnNHogttWcDRzOEtZuFno0ezgLMF1MSR4aK7:ItihoEtWsgSY5vHMES6aK7

    • Buer

      Buer is a new modular loader first seen in August 2019.

    • Modifies WinLogon for persistence

    • Buer Loader

      Detects Buer loader in memory or disk.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks