General

  • Target

    44bc72ad57ce5e45eb35ce42c16ffc90_JaffaCakes118

  • Size

    271KB

  • Sample

    241014-3l6f3ssbrd

  • MD5

    44bc72ad57ce5e45eb35ce42c16ffc90

  • SHA1

    bf3ee43b94a9dad6b773029604c9126d9a7399e2

  • SHA256

    32c77bc36295b8d831729745a73e3f42f1e8fe224bacd3d41ecf9ec5a4bc25a7

  • SHA512

    b6b648ac64faf9eb171d7bd3f121471737a99d2dbf36954845a3c319a9d7944e93114bb8fdb291a878500f6572f3eb1999149f1c2fdd1943439fae1689de4927

  • SSDEEP

    6144:Zmrc/DZckkdTrkHWCdtCb9JHk/sRnAlkLoXdZk:Zmo/JMfFMwZnOiIjk

Malware Config

Targets

    • Target

      44bc72ad57ce5e45eb35ce42c16ffc90_JaffaCakes118

    • Size

      271KB

    • MD5

      44bc72ad57ce5e45eb35ce42c16ffc90

    • SHA1

      bf3ee43b94a9dad6b773029604c9126d9a7399e2

    • SHA256

      32c77bc36295b8d831729745a73e3f42f1e8fe224bacd3d41ecf9ec5a4bc25a7

    • SHA512

      b6b648ac64faf9eb171d7bd3f121471737a99d2dbf36954845a3c319a9d7944e93114bb8fdb291a878500f6572f3eb1999149f1c2fdd1943439fae1689de4927

    • SSDEEP

      6144:Zmrc/DZckkdTrkHWCdtCb9JHk/sRnAlkLoXdZk:Zmo/JMfFMwZnOiIjk

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds policy Run key to start application

    • Disables taskbar notifications via registry modification

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks