General

  • Target

    0a238d4825cbf981766421b6c13786b4_JaffaCakes118

  • Size

    276KB

  • Sample

    241002-l6hr3szgrl

  • MD5

    0a238d4825cbf981766421b6c13786b4

  • SHA1

    e8869b02df3858e485f5f104fdc45d6644911900

  • SHA256

    622f79330bda2080671671ffcdcef09069c31093dbb9c0721329230fe11645c2

  • SHA512

    a6e63446cc7dcafe2436cb60f7a73743304a058aa164eb8793c75135e061d95cbf5ac6ddb6ac09f1c6cefd148f0c5d933c162bd7bbb05dc4b617840a88fe4e86

  • SSDEEP

    6144:8TPCUHeUYr5kj1OdOKRU64X9bGB7UqFoCevShTJVa0n/4:8OUZYr2jMoaUtXQBgCo3uJV7n/

Malware Config

Targets

    • Target

      0a238d4825cbf981766421b6c13786b4_JaffaCakes118

    • Size

      276KB

    • MD5

      0a238d4825cbf981766421b6c13786b4

    • SHA1

      e8869b02df3858e485f5f104fdc45d6644911900

    • SHA256

      622f79330bda2080671671ffcdcef09069c31093dbb9c0721329230fe11645c2

    • SHA512

      a6e63446cc7dcafe2436cb60f7a73743304a058aa164eb8793c75135e061d95cbf5ac6ddb6ac09f1c6cefd148f0c5d933c162bd7bbb05dc4b617840a88fe4e86

    • SSDEEP

      6144:8TPCUHeUYr5kj1OdOKRU64X9bGB7UqFoCevShTJVa0n/4:8OUZYr2jMoaUtXQBgCo3uJV7n/

    • Modifies security service

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks