General

  • Target

    1efcd378148d820ca9af363976597b03_JaffaCakes118

  • Size

    5.5MB

  • Sample

    241008-chmlpaxepb

  • MD5

    1efcd378148d820ca9af363976597b03

  • SHA1

    646a91c6a85b992e20c9d681fa42c7e309844c9a

  • SHA256

    b2c5593ff16f6c5f45ea569dffc4e12ef9161240e938de9c4e9eb1cb148b3e31

  • SHA512

    c958032a1f892d797a20a4c2d00b410f99da8b0d11615d3283c1e81ec006844f0f679d23dba835db689818015fc59e1bdf2d78a106798330e746f2b111f681bb

  • SSDEEP

    98304:7JYz+TnI90/Dcf2+p/2yFlw989s9eyflBsQDPK7w+HwtMmtXTi:7Ju+rIq/I15Pw9OsLflBLAw+CMmVTi

Malware Config

Targets

    • Target

      1efcd378148d820ca9af363976597b03_JaffaCakes118

    • Size

      5.5MB

    • MD5

      1efcd378148d820ca9af363976597b03

    • SHA1

      646a91c6a85b992e20c9d681fa42c7e309844c9a

    • SHA256

      b2c5593ff16f6c5f45ea569dffc4e12ef9161240e938de9c4e9eb1cb148b3e31

    • SHA512

      c958032a1f892d797a20a4c2d00b410f99da8b0d11615d3283c1e81ec006844f0f679d23dba835db689818015fc59e1bdf2d78a106798330e746f2b111f681bb

    • SSDEEP

      98304:7JYz+TnI90/Dcf2+p/2yFlw989s9eyflBsQDPK7w+HwtMmtXTi:7Ju+rIq/I15Pw9OsLflBLAw+CMmVTi

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • UAC bypass

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks