General

  • Target

    7ba00a7f8bf0f2d0237bd01bb12a825b_JaffaCakes118

  • Size

    3.3MB

  • Sample

    241029-dt85ha1qh1

  • MD5

    7ba00a7f8bf0f2d0237bd01bb12a825b

  • SHA1

    1af2a65956ba61ded056f90ef48e08abb7e4e6b5

  • SHA256

    a80595d5777175cd4da514edb06d38676888daf62608369b816b2f11b6aa9cc2

  • SHA512

    9b99656efbb22c6eb0e3cee3a5949d3f5cbf1e24821b30d3ee33bfcea5a0928cc96a05daf19cbf88041e75030f3168727045bb1630a0ddf2edd6d6465eab761b

  • SSDEEP

    98304:JK0LsE9LvEbGRN0nM1BOhu3uiJgR2qpNeJ:JK4sIoGDhBuu8j8J

Malware Config

Extracted

Family

nullmixer

C2

http://znegs.xyz/

Targets

    • Target

      7ba00a7f8bf0f2d0237bd01bb12a825b_JaffaCakes118

    • Size

      3.3MB

    • MD5

      7ba00a7f8bf0f2d0237bd01bb12a825b

    • SHA1

      1af2a65956ba61ded056f90ef48e08abb7e4e6b5

    • SHA256

      a80595d5777175cd4da514edb06d38676888daf62608369b816b2f11b6aa9cc2

    • SHA512

      9b99656efbb22c6eb0e3cee3a5949d3f5cbf1e24821b30d3ee33bfcea5a0928cc96a05daf19cbf88041e75030f3168727045bb1630a0ddf2edd6d6465eab761b

    • SSDEEP

      98304:JK0LsE9LvEbGRN0nM1BOhu3uiJgR2qpNeJ:JK4sIoGDhBuu8j8J

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Nullmixer family

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Privateloader family

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      setup_installer.exe

    • Size

      3.3MB

    • MD5

      8765c39cc6647adc171220b11942422b

    • SHA1

      5a45fd626dcf26b1f933e5a18db138fe1df64444

    • SHA256

      f52e34603c58c806081a09fc4ba38eabe1e3f12b7a57a75353ecf593177fa7ef

    • SHA512

      8c5bf35e5d6dc7aab1bff4836ef00e44d7e158d4b8d3f9bcf9ebb39a02b21078c5879f061ac926aa52b9a0f9a83752f322db1d98c1a2908a9ec5eed60919fa65

    • SSDEEP

      98304:xpeKfE9KlGB9z8qTsF5iOew3qrCvLUBsKxp:x8/9HHoGDQLUCKxp

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Nullmixer family

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Privateloader family

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Vidar Stealer

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks