General

  • Target

    ee6beb068e9174303d96f49276450df6_JaffaCakes118

  • Size

    524KB

  • Sample

    240920-zxbt3axhja

  • MD5

    ee6beb068e9174303d96f49276450df6

  • SHA1

    4cc98dd63198f62de16b53b19e71d708046f79aa

  • SHA256

    594432d62d4e549da865633dfd38cf35d6d681c1c74dbc551c1ab6620a9c0375

  • SHA512

    21ac89b167f151b83947c7048879035950b71806589877cf73ac5d1f584c7e5870dfe8454b1a35a83dfef7db6be2d4e8505521d446529bb6323ff6060125b211

  • SSDEEP

    12288:2oKUsL6A+fkDtVFB7eE6CU2pn2HGJNZhupdC8PPho5:J/sXrU3Caa

Malware Config

Targets

    • Target

      LetsTryAnal - Christy Mack (Anal With An Attitude).exe

    • Size

      524KB

    • MD5

      8100e3a84c64d7cafa56c1cc23883474

    • SHA1

      9e4296f449b4b9195eae1355ff9cced63fd0a7a4

    • SHA256

      2225d914a5b0d0e06c4b0daf473066d68143ea2dda10a6619d9734d2108c9a77

    • SHA512

      dcd68f6584f02d722086285383fd8b2503c41e404e728296008ea9c5e5d2b5305d17fe97077990430a30b8655700526e2f1cb3eb4d2451d29d40264d4e0cdbba

    • SSDEEP

      12288:goKUsL6A+fkDtVFB7eE6CU2pn2HGJNZhupdC8PPho:f/sXrU3Ca

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks