General

  • Target

    ee79991defde27b1bbc6713c57861d6c_JaffaCakes118

  • Size

    98KB

  • Sample

    240920-1jq79szapg

  • MD5

    ee79991defde27b1bbc6713c57861d6c

  • SHA1

    221f0c006177b320017700aa1baf237d0f36c049

  • SHA256

    69f8183bfcc99d9a80f9c9aba0aea150b134885f4b7898915a652249e9e03167

  • SHA512

    7f4eaebf607e8afddb9a244d93909d66d21d7244d4506a862d3360ece20057e6bbca88102a5f5890e070504b01d326068bb362aecfb9025d854e179a6c2de78f

  • SSDEEP

    1536:cTXB+5p3Bi+HpM4tmJIxqG0/7vd8xUxPpZzmbOcVf2nxqG0/7vd87:cTs3BxJNmJIxqdLdT/ZzmKZxqdLdG

Malware Config

Targets

    • Target

      ee79991defde27b1bbc6713c57861d6c_JaffaCakes118

    • Size

      98KB

    • MD5

      ee79991defde27b1bbc6713c57861d6c

    • SHA1

      221f0c006177b320017700aa1baf237d0f36c049

    • SHA256

      69f8183bfcc99d9a80f9c9aba0aea150b134885f4b7898915a652249e9e03167

    • SHA512

      7f4eaebf607e8afddb9a244d93909d66d21d7244d4506a862d3360ece20057e6bbca88102a5f5890e070504b01d326068bb362aecfb9025d854e179a6c2de78f

    • SSDEEP

      1536:cTXB+5p3Bi+HpM4tmJIxqG0/7vd8xUxPpZzmbOcVf2nxqG0/7vd87:cTs3BxJNmJIxqdLdT/ZzmKZxqdLdG

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks