General

  • Target

    23b9f735f8bb2607ae05fec9b71dee60_JaffaCakes118

  • Size

    5.7MB

  • Sample

    241008-xgb4satenn

  • MD5

    23b9f735f8bb2607ae05fec9b71dee60

  • SHA1

    0c0209030161610fca6baba7ecb588da4029f6aa

  • SHA256

    0df9cc018e5258e289ffea0bb4137ae6f0bc8fe85b48b544520c7dae95453f68

  • SHA512

    3ea0a8c2157dfaa159e529785b2497da71c41f1d95f371b36f86ada8ca5c76cf02e858cfce6f1043b3f5c0b3f284b4a1f903b6fa6e05a29a1af4f5fc7c1cb322

  • SSDEEP

    98304:y/Pu1T6mvtNC5BcF4qdYOkDPZoSa6VcCThT5U7Sg3KWOlsUEn99:y/6T6mrCbM42uDPza6CCT3/BsH9

Malware Config

Extracted

Family

nullmixer

C2

http://marisana.xyz/

Targets

    • Target

      23b9f735f8bb2607ae05fec9b71dee60_JaffaCakes118

    • Size

      5.7MB

    • MD5

      23b9f735f8bb2607ae05fec9b71dee60

    • SHA1

      0c0209030161610fca6baba7ecb588da4029f6aa

    • SHA256

      0df9cc018e5258e289ffea0bb4137ae6f0bc8fe85b48b544520c7dae95453f68

    • SHA512

      3ea0a8c2157dfaa159e529785b2497da71c41f1d95f371b36f86ada8ca5c76cf02e858cfce6f1043b3f5c0b3f284b4a1f903b6fa6e05a29a1af4f5fc7c1cb322

    • SSDEEP

      98304:y/Pu1T6mvtNC5BcF4qdYOkDPZoSa6VcCThT5U7Sg3KWOlsUEn99:y/6T6mrCbM42uDPza6CCT3/BsH9

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      setup_installer.exe

    • Size

      5.7MB

    • MD5

      d0f7d49584c9a7eabe1b8bcfe8d3ebff

    • SHA1

      d18a3d0423416eaa1b57cf2740131dc44bedf64b

    • SHA256

      9a7b82f502bc2fd0a2af0a18fbb88e0fb12887ea9f28da5d7dca2fdd95a9afe5

    • SHA512

      c3cf6c66260bff5240c96803d6e45df6025b2e344361d74289394f786f28a9f336d0115e8406166ac1751b6a98e1b528d8423ebebd4ced4c20d8209bcea9179c

    • SSDEEP

      98304:xiCvLUBsghtMHD9A3E8IEaHxwrVbMVclfmQ5TvfTOpKiU8mcPPrL6DZm:xTLUCgh0PmpbM+n5/kKi/P3UZm

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks