General

  • Target

    eed6408824f42589f454b55a7100461a_JaffaCakes118

  • Size

    201KB

  • Sample

    240921-b5lggazana

  • MD5

    eed6408824f42589f454b55a7100461a

  • SHA1

    5908baefe59f508d1ca7cc54dfa9b47ee2cb0cd7

  • SHA256

    1c7876c9197afcf36d7da9b6a5ccbaf54aa6edbeb2ab18129db26b5ed3e4b394

  • SHA512

    b84c7331226f37d8f178dd3a7553f14b328c9717db17645318e9c58bd5f23ed71a8a2f661059f3fd280a578b0189e2da2fd6633db55d8e671a2a9aa321da0c1f

  • SSDEEP

    3072:s/phFZX3hy/OxIIsrurCSGsvCmUMnyWJKlwVN2ITE:sPrYUICV6mUMxJ30

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    elskerdanmark4700

Targets

    • Target

      eed6408824f42589f454b55a7100461a_JaffaCakes118

    • Size

      201KB

    • MD5

      eed6408824f42589f454b55a7100461a

    • SHA1

      5908baefe59f508d1ca7cc54dfa9b47ee2cb0cd7

    • SHA256

      1c7876c9197afcf36d7da9b6a5ccbaf54aa6edbeb2ab18129db26b5ed3e4b394

    • SHA512

      b84c7331226f37d8f178dd3a7553f14b328c9717db17645318e9c58bd5f23ed71a8a2f661059f3fd280a578b0189e2da2fd6633db55d8e671a2a9aa321da0c1f

    • SSDEEP

      3072:s/phFZX3hy/OxIIsrurCSGsvCmUMnyWJKlwVN2ITE:sPrYUICV6mUMxJ30

    • Modifies firewall policy service

    • UAC bypass

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks