General

  • Target

    fde529998c9208800c6d4090256e096c_JaffaCakes118

  • Size

    133KB

  • Sample

    240929-gayq7svapb

  • MD5

    fde529998c9208800c6d4090256e096c

  • SHA1

    881ab53bf67a25c86b7455f9cd3330ed825047e8

  • SHA256

    470760a69440b7c05392d8264dadbe607a5c5c245597439d0d14fa79e3060567

  • SHA512

    2cb5d2d92e66a9ade39b9bbbddd821099e5509416194f09a095ef6044a1cfa6c1e9b3e06d5db0a773b6a7441755da1fea7dc8c7a7a766ad79ed586bd594f6533

  • SSDEEP

    3072:T4HuW35v1Kw/zi+PXbatLgD/YOfhHzNay0mxm29aboRm7leVhYwukpYQNb:T4vT/hfbap+/YExB0URm7leVhYwukpYG

Malware Config

Targets

    • Target

      fde529998c9208800c6d4090256e096c_JaffaCakes118

    • Size

      133KB

    • MD5

      fde529998c9208800c6d4090256e096c

    • SHA1

      881ab53bf67a25c86b7455f9cd3330ed825047e8

    • SHA256

      470760a69440b7c05392d8264dadbe607a5c5c245597439d0d14fa79e3060567

    • SHA512

      2cb5d2d92e66a9ade39b9bbbddd821099e5509416194f09a095ef6044a1cfa6c1e9b3e06d5db0a773b6a7441755da1fea7dc8c7a7a766ad79ed586bd594f6533

    • SSDEEP

      3072:T4HuW35v1Kw/zi+PXbatLgD/YOfhHzNay0mxm29aboRm7leVhYwukpYQNb:T4vT/hfbap+/YExB0URm7leVhYwukpYG

    • Contacts a large (15920) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads system routing table

      Gets active network interfaces from /proc virtual filesystem.

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks