General

  • Target

    f3b20f6416600411e0c39b24acdf77ad_JaffaCakes118

  • Size

    279KB

  • Sample

    240924-p87e1awbmk

  • MD5

    f3b20f6416600411e0c39b24acdf77ad

  • SHA1

    338eb3064e4d57b3a118739c64bd4d1b7bbe079e

  • SHA256

    414912f394029979d4e49f1a6193a4e688e1d2400d25ab4d1872d56ae81e4310

  • SHA512

    45a1dcbb70b784a0f7af95b959f3b90f0dc7ef9c3df527663fc93f5b8320b4e6663ceb4e9660b2d5f90c8ef7c90de0a6e58eb55e5cb5dc2ef047d50567edbd39

  • SSDEEP

    6144:k0G2M0hFVgp+VWMufkWLIc+JXBESYW8B5:k0x5k+VWMu8WknEu8X

Malware Config

Targets

    • Target

      f3b20f6416600411e0c39b24acdf77ad_JaffaCakes118

    • Size

      279KB

    • MD5

      f3b20f6416600411e0c39b24acdf77ad

    • SHA1

      338eb3064e4d57b3a118739c64bd4d1b7bbe079e

    • SHA256

      414912f394029979d4e49f1a6193a4e688e1d2400d25ab4d1872d56ae81e4310

    • SHA512

      45a1dcbb70b784a0f7af95b959f3b90f0dc7ef9c3df527663fc93f5b8320b4e6663ceb4e9660b2d5f90c8ef7c90de0a6e58eb55e5cb5dc2ef047d50567edbd39

    • SSDEEP

      6144:k0G2M0hFVgp+VWMufkWLIc+JXBESYW8B5:k0x5k+VWMu8WknEu8X

    • Modifies WinLogon for persistence

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks