General

  • Target

    72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118

  • Size

    270KB

  • Sample

    241024-g8cxdsygqq

  • MD5

    72af77c56d3b97a9b7a20d64f2eccbdb

  • SHA1

    d9728f6cb916b80d5025c97e1962f2702cfd85b0

  • SHA256

    cbe4304b53299ee4a4efde997098002b12eecd8561f9f185bc79a38c0cb07f5f

  • SHA512

    486782d515c20e510ff55ec7682af9f168153a175b20594f3acd3e0cd78c262c95d56868987f531c05cd9e6a3a791df4013b44a14b32446f806e03eebddee63e

  • SSDEEP

    6144:aMj3EykWU+WNLtZa2XNQCZ3x2jRDXe6qzif0froq:5jUyw+u7a2XpB2dTVqziao

Malware Config

Targets

    • Target

      72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118

    • Size

      270KB

    • MD5

      72af77c56d3b97a9b7a20d64f2eccbdb

    • SHA1

      d9728f6cb916b80d5025c97e1962f2702cfd85b0

    • SHA256

      cbe4304b53299ee4a4efde997098002b12eecd8561f9f185bc79a38c0cb07f5f

    • SHA512

      486782d515c20e510ff55ec7682af9f168153a175b20594f3acd3e0cd78c262c95d56868987f531c05cd9e6a3a791df4013b44a14b32446f806e03eebddee63e

    • SSDEEP

      6144:aMj3EykWU+WNLtZa2XNQCZ3x2jRDXe6qzif0froq:5jUyw+u7a2XpB2dTVqziao

    • Modifies security service

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks