General

  • Target

    6fbfe6a44dde69c6fabe54177c72723b_JaffaCakes118

  • Size

    337KB

  • Sample

    241023-tfamsa1ajr

  • MD5

    6fbfe6a44dde69c6fabe54177c72723b

  • SHA1

    a0a6e5d842c14d8ab45422b79488fd6164c95295

  • SHA256

    5d12608efb8d25cd671f6060d391d66f68323cc78c5475c39e227b7af3a5ad2b

  • SHA512

    86b3d62eee58afd0c0e71e2e8e1b654e8b1255040ae288380729e96fef48e8b3acaf816b0f5b9cb42e8d24cffa254467a9f088c88f34b6a1c8f4cf7eb81a33bf

  • SSDEEP

    6144:Mak9hyxEXYGc7q7vqO6eun45AjuQgIPcIiwrqrnbjXz6zc9aLL+eUTZ9oO8KbFil:MkxEXT7XIAAGkqb36zVeTZ+O8GFsP

Malware Config

Targets

    • Target

      6fbfe6a44dde69c6fabe54177c72723b_JaffaCakes118

    • Size

      337KB

    • MD5

      6fbfe6a44dde69c6fabe54177c72723b

    • SHA1

      a0a6e5d842c14d8ab45422b79488fd6164c95295

    • SHA256

      5d12608efb8d25cd671f6060d391d66f68323cc78c5475c39e227b7af3a5ad2b

    • SHA512

      86b3d62eee58afd0c0e71e2e8e1b654e8b1255040ae288380729e96fef48e8b3acaf816b0f5b9cb42e8d24cffa254467a9f088c88f34b6a1c8f4cf7eb81a33bf

    • SSDEEP

      6144:Mak9hyxEXYGc7q7vqO6eun45AjuQgIPcIiwrqrnbjXz6zc9aLL+eUTZ9oO8KbFil:MkxEXT7XIAAGkqb36zVeTZ+O8GFsP

    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks