General

  • Target

    ff6ae12266d02f95b208baf95b04476b_JaffaCakes118

  • Size

    122KB

  • Sample

    240929-2lknyaxfmd

  • MD5

    ff6ae12266d02f95b208baf95b04476b

  • SHA1

    eef52ce60d0fb0e46ac230e1a847508ed3e1b538

  • SHA256

    97e67a2fd6bc40377be7dc7fe0fa7c28e6939d30f9a9fac470b963ef18a825e3

  • SHA512

    60f79b2d5939c7b4838cd9a4e61d62421f9bb226baa4854b5d85a4280eef4b9ce55155d071d801887d03674cb290bd43bd81e0b95180b4d980ac753b84432088

  • SSDEEP

    1536:3LXB65939tY6HBg4sXJSiwhKKS20aAksKLnVR1KxSmiwGOcVf2tgUfR:3Lk395hYXJSiZKohynwx5i0HN

Malware Config

Targets

    • Target

      ff6ae12266d02f95b208baf95b04476b_JaffaCakes118

    • Size

      122KB

    • MD5

      ff6ae12266d02f95b208baf95b04476b

    • SHA1

      eef52ce60d0fb0e46ac230e1a847508ed3e1b538

    • SHA256

      97e67a2fd6bc40377be7dc7fe0fa7c28e6939d30f9a9fac470b963ef18a825e3

    • SHA512

      60f79b2d5939c7b4838cd9a4e61d62421f9bb226baa4854b5d85a4280eef4b9ce55155d071d801887d03674cb290bd43bd81e0b95180b4d980ac753b84432088

    • SSDEEP

      1536:3LXB65939tY6HBg4sXJSiwhKKS20aAksKLnVR1KxSmiwGOcVf2tgUfR:3Lk395hYXJSiZKohynwx5i0HN

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks