General

  • Target

    3d9c1936e0abe5ba631f9e96be1f0b54_JaffaCakes118

  • Size

    159KB

  • Sample

    241013-eamb3a1hmp

  • MD5

    3d9c1936e0abe5ba631f9e96be1f0b54

  • SHA1

    915c6c86b1f9fc006fde90e6f69ea626552714f6

  • SHA256

    e1ff83bc75d77151037983e62535f2bbe38122cb1ab1de146042faab3df49387

  • SHA512

    0e015c30ef2d848e02896d4b168b1a3fcf447276d320a8356d0da4aa8b6ce0e5e09e64786b9c6dbde022080f36264e2f65845ebe021a5a3ec41cdaa95b8d1c5c

  • SSDEEP

    1536:K5oln+NoxSIwBNE7dSxMDA7/qrlQ0gErUvxHEAnHx/eOKyiJ5teEEcSn9ki7j3ej:K52nIvIwcUQAWh+EoEABBibtNaP7j3rU

Malware Config

Targets

    • Target

      3d9c1936e0abe5ba631f9e96be1f0b54_JaffaCakes118

    • Size

      159KB

    • MD5

      3d9c1936e0abe5ba631f9e96be1f0b54

    • SHA1

      915c6c86b1f9fc006fde90e6f69ea626552714f6

    • SHA256

      e1ff83bc75d77151037983e62535f2bbe38122cb1ab1de146042faab3df49387

    • SHA512

      0e015c30ef2d848e02896d4b168b1a3fcf447276d320a8356d0da4aa8b6ce0e5e09e64786b9c6dbde022080f36264e2f65845ebe021a5a3ec41cdaa95b8d1c5c

    • SSDEEP

      1536:K5oln+NoxSIwBNE7dSxMDA7/qrlQ0gErUvxHEAnHx/eOKyiJ5teEEcSn9ki7j3ej:K52nIvIwcUQAWh+EoEABBibtNaP7j3rU

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Event Triggered Execution: Image File Execution Options Injection

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks