General

  • Target

    9c123a09cb57f3b95f8e51a9fc2579a9_JaffaCakes118

  • Size

    976KB

  • Sample

    241125-rsv35sxnbm

  • MD5

    9c123a09cb57f3b95f8e51a9fc2579a9

  • SHA1

    8db03484918b05e7c7b0d000aab2220dd4490564

  • SHA256

    d1da6ec1ad358e81b983f7fd9aefd36fcdbbd8beaee7b0b81827de2596fa9f2a

  • SHA512

    b1937ed3c182794d03292f76eb76deb4bc5bb1428462ded1675be8d0abdd140e9216e2e828dd514884c61ad794583f56f58aede0b96e70f242e56ca1eaa51c0b

  • SSDEEP

    24576:Ngc1riyXHE/S1GNiLNjlGDcw30bboJ4ZHPTV9XF7A7:Ngc1uMHB1SiLNpGDcjYJ4ZvPF

Malware Config

Targets

    • Target

      9c123a09cb57f3b95f8e51a9fc2579a9_JaffaCakes118

    • Size

      976KB

    • MD5

      9c123a09cb57f3b95f8e51a9fc2579a9

    • SHA1

      8db03484918b05e7c7b0d000aab2220dd4490564

    • SHA256

      d1da6ec1ad358e81b983f7fd9aefd36fcdbbd8beaee7b0b81827de2596fa9f2a

    • SHA512

      b1937ed3c182794d03292f76eb76deb4bc5bb1428462ded1675be8d0abdd140e9216e2e828dd514884c61ad794583f56f58aede0b96e70f242e56ca1eaa51c0b

    • SSDEEP

      24576:Ngc1riyXHE/S1GNiLNjlGDcw30bboJ4ZHPTV9XF7A7:Ngc1uMHB1SiLNpGDcjYJ4ZvPF

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks