General

  • Target

    eb2f336a539ceccf2ac72899e7146263_JaffaCakes118

  • Size

    556KB

  • Sample

    240919-my6dvavfrr

  • MD5

    eb2f336a539ceccf2ac72899e7146263

  • SHA1

    38357fcb4702838f58be330a947f055bb1dd3737

  • SHA256

    11254e86c7d30a63765973e6a2e037efe3ff576bdca24d510866589e034b2f33

  • SHA512

    14c855b674db04be71c9348792088fc9bcbda84bad1f1172c84eea03f77b3a7651b091d31468889da0d8f0db9837d92b156fa0f9c032c50cf3796944e148c7ae

  • SSDEEP

    12288:i7Lo8Rs90X41cnOOWB2KpyYK4BVqZDx2mpmHPW9GROsI8w:i7L1yMgcnOds44Fp2PWUDI8

Malware Config

Targets

    • Target

      eb2f336a539ceccf2ac72899e7146263_JaffaCakes118

    • Size

      556KB

    • MD5

      eb2f336a539ceccf2ac72899e7146263

    • SHA1

      38357fcb4702838f58be330a947f055bb1dd3737

    • SHA256

      11254e86c7d30a63765973e6a2e037efe3ff576bdca24d510866589e034b2f33

    • SHA512

      14c855b674db04be71c9348792088fc9bcbda84bad1f1172c84eea03f77b3a7651b091d31468889da0d8f0db9837d92b156fa0f9c032c50cf3796944e148c7ae

    • SSDEEP

      12288:i7Lo8Rs90X41cnOOWB2KpyYK4BVqZDx2mpmHPW9GROsI8w:i7L1yMgcnOds44Fp2PWUDI8

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks