General

  • Target

    a389e09c036ecdf3a84ea4bbe65e8b88_JaffaCakes118

  • Size

    4.3MB

  • Sample

    241126-xglcfszrcr

  • MD5

    a389e09c036ecdf3a84ea4bbe65e8b88

  • SHA1

    0044fb8a60a621d8366ad93e9e99b8e99ea37bf8

  • SHA256

    e22cbaeb92b791e43ee4c70ad079fa2bb31faf721ce507390b41eadc1ca31cad

  • SHA512

    103de51314420c6b84a4ef2e7111beebaa04004ecc3ccacfbc5f86c451e551e97590af570b86d9162a8c32d1e5c777e3bcbafa3edaffe28a8055cec971c4ba9c

  • SSDEEP

    98304:7JYnakukyg+fCpLG9fevK46z4hF42Xp+wsTWgIZY3THkxfqvcQ9:7J+aHDnfCBsfewzcF42Xp+wZgIm3zkxw

Malware Config

Targets

    • Target

      a389e09c036ecdf3a84ea4bbe65e8b88_JaffaCakes118

    • Size

      4.3MB

    • MD5

      a389e09c036ecdf3a84ea4bbe65e8b88

    • SHA1

      0044fb8a60a621d8366ad93e9e99b8e99ea37bf8

    • SHA256

      e22cbaeb92b791e43ee4c70ad079fa2bb31faf721ce507390b41eadc1ca31cad

    • SHA512

      103de51314420c6b84a4ef2e7111beebaa04004ecc3ccacfbc5f86c451e551e97590af570b86d9162a8c32d1e5c777e3bcbafa3edaffe28a8055cec971c4ba9c

    • SSDEEP

      98304:7JYnakukyg+fCpLG9fevK46z4hF42Xp+wsTWgIZY3THkxfqvcQ9:7J+aHDnfCBsfewzcF42Xp+wZgIm3zkxw

    • Disables service(s)

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Rms family

    • Indicator Removal: Network Share Connection Removal

      Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks