General

  • Target

    ede78b690c429d70a8e0c7c57fb42e96_JaffaCakes118

  • Size

    208KB

  • Sample

    240920-s3j93atfjg

  • MD5

    ede78b690c429d70a8e0c7c57fb42e96

  • SHA1

    b87348ade98a93aa230bf669b9df633fbfe1fdc3

  • SHA256

    65084092ad6ebba7a62d4dea9e70fedb51a95e4c0c143a69ee119036452a0f6f

  • SHA512

    d04b631aca7aa7bff3c56757d54b4398bc04b9f6a73289ecdb5700a3ac79e55a787cbc52ed6a27f2d284f81de16d019477fe16a299ed2826901a65753153957d

  • SSDEEP

    3072:bVHgCc4xGvbwcU9KQ2BBAHmaPxNVoab5E1:yCc4xGxWKQ2Bonxi

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.byethost12.com
  • Port:
    21
  • Username:
    b12_8082975
  • Password:
    951753zx

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Targets

    • Target

      ede78b690c429d70a8e0c7c57fb42e96_JaffaCakes118

    • Size

      208KB

    • MD5

      ede78b690c429d70a8e0c7c57fb42e96

    • SHA1

      b87348ade98a93aa230bf669b9df633fbfe1fdc3

    • SHA256

      65084092ad6ebba7a62d4dea9e70fedb51a95e4c0c143a69ee119036452a0f6f

    • SHA512

      d04b631aca7aa7bff3c56757d54b4398bc04b9f6a73289ecdb5700a3ac79e55a787cbc52ed6a27f2d284f81de16d019477fe16a299ed2826901a65753153957d

    • SSDEEP

      3072:bVHgCc4xGvbwcU9KQ2BBAHmaPxNVoab5E1:yCc4xGxWKQ2Bonxi

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks