General

  • Target

    edb7022befe4f54913188c8e4c9d3068_JaffaCakes118

  • Size

    10KB

  • Sample

    240920-q1qb7azclm

  • MD5

    edb7022befe4f54913188c8e4c9d3068

  • SHA1

    c241e1fee63241f3ccea685dcd9be3b5c2063477

  • SHA256

    3178948831314f3ed4d92ce6a40641466813e85aa11e5088e8661ec99881ddf0

  • SHA512

    a9ca5a6012a523fa532f1906a77321ba28cc11b84ab9ddac7a4ea1ea105292fa51e0be079327a11fd66e924c201035a86e250640f165fb12e400c4ed688a4a0e

  • SSDEEP

    192:Gj0H0G6wUT2Tqw0jYx1QZF+b40BZZU/ObZ32TvJawDJ/qcNZDJ/qcZjFpje62IRH:GjqxjUy70jYx1QZF+b40nZuOlGbJawDD

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://chaliang.115ku.cn/5784/yahooo.htm%22,0%29%28window.close%29

Targets

    • Target

      edb7022befe4f54913188c8e4c9d3068_JaffaCakes118

    • Size

      10KB

    • MD5

      edb7022befe4f54913188c8e4c9d3068

    • SHA1

      c241e1fee63241f3ccea685dcd9be3b5c2063477

    • SHA256

      3178948831314f3ed4d92ce6a40641466813e85aa11e5088e8661ec99881ddf0

    • SHA512

      a9ca5a6012a523fa532f1906a77321ba28cc11b84ab9ddac7a4ea1ea105292fa51e0be079327a11fd66e924c201035a86e250640f165fb12e400c4ed688a4a0e

    • SSDEEP

      192:Gj0H0G6wUT2Tqw0jYx1QZF+b40BZZU/ObZ32TvJawDJ/qcNZDJ/qcZjFpje62IRH:GjqxjUy70jYx1QZF+b40nZuOlGbJawDD

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks