General

  • Target

    16cf1b5fdb75b32737e162897992e252_JaffaCakes118

  • Size

    105KB

  • Sample

    241005-jp9s5axhmd

  • MD5

    16cf1b5fdb75b32737e162897992e252

  • SHA1

    0770aab281b2b6c9ef1c422db33e9fcffc5a8189

  • SHA256

    3224d36db7a560fe8bedc982346e41c78c9704e00bf9085f0a3ef0b491710715

  • SHA512

    aec0a85790ffcaf93be518e0ae1982f3ce5b1d6b042dc2866d56a9b649ca8f43be7377d4a8fbb413e282935b9b926aa9ce70ea71a1319c5a4a1598eeb264ad17

  • SSDEEP

    3072:zAK0CBezOU+8isBve4bF3u5jwaaHw7Koj4rIed:83z+svb1uze

Malware Config

Targets

    • Target

      16cf1b5fdb75b32737e162897992e252_JaffaCakes118

    • Size

      105KB

    • MD5

      16cf1b5fdb75b32737e162897992e252

    • SHA1

      0770aab281b2b6c9ef1c422db33e9fcffc5a8189

    • SHA256

      3224d36db7a560fe8bedc982346e41c78c9704e00bf9085f0a3ef0b491710715

    • SHA512

      aec0a85790ffcaf93be518e0ae1982f3ce5b1d6b042dc2866d56a9b649ca8f43be7377d4a8fbb413e282935b9b926aa9ce70ea71a1319c5a4a1598eeb264ad17

    • SSDEEP

      3072:zAK0CBezOU+8isBve4bF3u5jwaaHw7Koj4rIed:83z+svb1uze

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks