General

  • Target

    1355d10d18af19532743d033cc8e2cda_JaffaCakes118

  • Size

    281KB

  • Sample

    241004-pg7axsxfrd

  • MD5

    1355d10d18af19532743d033cc8e2cda

  • SHA1

    345a6d9ff44581ba1182054d023e1eb31badd2b3

  • SHA256

    ba44004d91ec1914e9ebf44239c2429244ecf9a14e3666fae4b45f4f1d34daf6

  • SHA512

    6d9188402c4c6270cfee28b7a02e59cdf2344abc1b568e5068dd8db6b7ecd22ac47e4c562b0cdf70fcfb6cbd43bff37fe2624e36e5a7d6d473f619ab3fd9fd80

  • SSDEEP

    6144:MNmZjCnD89otkjn7RRRJRRRRRdRRRJRRRdRRRVRRRdRRR5RRRRRdRRRRRRRRRdRl:MUVJsXbGO4FYvw

Malware Config

Targets

    • Target

      1355d10d18af19532743d033cc8e2cda_JaffaCakes118

    • Size

      281KB

    • MD5

      1355d10d18af19532743d033cc8e2cda

    • SHA1

      345a6d9ff44581ba1182054d023e1eb31badd2b3

    • SHA256

      ba44004d91ec1914e9ebf44239c2429244ecf9a14e3666fae4b45f4f1d34daf6

    • SHA512

      6d9188402c4c6270cfee28b7a02e59cdf2344abc1b568e5068dd8db6b7ecd22ac47e4c562b0cdf70fcfb6cbd43bff37fe2624e36e5a7d6d473f619ab3fd9fd80

    • SSDEEP

      6144:MNmZjCnD89otkjn7RRRJRRRRRdRRRJRRRdRRRVRRRdRRR5RRRRRdRRRRRRRRRdRl:MUVJsXbGO4FYvw

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks