General

  • Target

    fa9b3eb8ceb9cc3095273a7296435c10_JaffaCakes118

  • Size

    37KB

  • Sample

    240927-r9ms4azfqf

  • MD5

    fa9b3eb8ceb9cc3095273a7296435c10

  • SHA1

    d6709b6c773bb9e22e83f42d7f179723c5733e4a

  • SHA256

    fdb77db96e67990fc60d4f95225143d14c0f8aaba5fbb25f8891ae18c99afc61

  • SHA512

    b4d20567037487d6084c21848e14bf1b3c3aa6c1930c68032560687630e69630d4863271289a7a1157ade3f07b0b24cc007ba194ba513835d37f7b1d4ba10de8

  • SSDEEP

    768:zJx5nmmBmDTTaFhzYKkmlk5ezUKSji/syp5OdjFnSiFJzub6rwZ:NvnmmBmDT+zzYKkRQg+zp5IFnSiFQ6rU

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    pokemon123456

Targets

    • Target

      fa9b3eb8ceb9cc3095273a7296435c10_JaffaCakes118

    • Size

      37KB

    • MD5

      fa9b3eb8ceb9cc3095273a7296435c10

    • SHA1

      d6709b6c773bb9e22e83f42d7f179723c5733e4a

    • SHA256

      fdb77db96e67990fc60d4f95225143d14c0f8aaba5fbb25f8891ae18c99afc61

    • SHA512

      b4d20567037487d6084c21848e14bf1b3c3aa6c1930c68032560687630e69630d4863271289a7a1157ade3f07b0b24cc007ba194ba513835d37f7b1d4ba10de8

    • SSDEEP

      768:zJx5nmmBmDTTaFhzYKkmlk5ezUKSji/syp5OdjFnSiFJzub6rwZ:NvnmmBmDT+zzYKkRQg+zp5IFnSiFQ6rU

    Score
    10/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks