General

  • Target

    fb83d1b22ab9eb6372a3233df43cf9d2_JaffaCakes118

  • Size

    269KB

  • Sample

    240928-e8fl6sxdkl

  • MD5

    fb83d1b22ab9eb6372a3233df43cf9d2

  • SHA1

    195048e02891e93740d927cf1f5c18efa64ffe79

  • SHA256

    c259d063f88902fa40d0406ad6351ec5d1b58ea676832db9b4079853a114d63c

  • SHA512

    2c27f904295b5b56b3ba7557b78840bd0b0fe1f893e1999a8c989749acd53f9ddec0875bba18302b442b7e8b3aa93ad0cce0abc95a641e5c79b7a25845f62550

  • SSDEEP

    6144:PCztybN0jwEz0vTYsj/qZXsyp/wRDy7+Mb+f90v:u6aSJQXzp8+iMbg0v

Malware Config

Targets

    • Target

      fb83d1b22ab9eb6372a3233df43cf9d2_JaffaCakes118

    • Size

      269KB

    • MD5

      fb83d1b22ab9eb6372a3233df43cf9d2

    • SHA1

      195048e02891e93740d927cf1f5c18efa64ffe79

    • SHA256

      c259d063f88902fa40d0406ad6351ec5d1b58ea676832db9b4079853a114d63c

    • SHA512

      2c27f904295b5b56b3ba7557b78840bd0b0fe1f893e1999a8c989749acd53f9ddec0875bba18302b442b7e8b3aa93ad0cce0abc95a641e5c79b7a25845f62550

    • SSDEEP

      6144:PCztybN0jwEz0vTYsj/qZXsyp/wRDy7+Mb+f90v:u6aSJQXzp8+iMbg0v

    • Modifies security service

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks