General

  • Target

    df9623834c4b66446eeafe6daa381921_JaffaCakes118

  • Size

    60KB

  • Sample

    241211-c8rnbsxjdn

  • MD5

    df9623834c4b66446eeafe6daa381921

  • SHA1

    f7f291918b22a5413f50dd021c8098a60086d742

  • SHA256

    e0842d5a6de5e1a5c8924e338598468d2de7d976d636c9ebf04bc8001b5c9faf

  • SHA512

    4cc16052971f555a03cd6a04e0529843e2490f009fedd5d0e2d5200f322cba2b9f41e76abc4d1cef3f98c57d17cb4e59c62b3081d26bc578e1336d1188296a6d

  • SSDEEP

    768:LE30e/7tEaWcArSwaydTb0EroSd3QXGsBS4sZFFSUv6GfEK+RsWW2qTN4lvCy2ZL:k+PeXonnUStQXDI4spvVp+N8NECtH3T

Malware Config

Targets

    • Target

      df9623834c4b66446eeafe6daa381921_JaffaCakes118

    • Size

      60KB

    • MD5

      df9623834c4b66446eeafe6daa381921

    • SHA1

      f7f291918b22a5413f50dd021c8098a60086d742

    • SHA256

      e0842d5a6de5e1a5c8924e338598468d2de7d976d636c9ebf04bc8001b5c9faf

    • SHA512

      4cc16052971f555a03cd6a04e0529843e2490f009fedd5d0e2d5200f322cba2b9f41e76abc4d1cef3f98c57d17cb4e59c62b3081d26bc578e1336d1188296a6d

    • SSDEEP

      768:LE30e/7tEaWcArSwaydTb0EroSd3QXGsBS4sZFFSUv6GfEK+RsWW2qTN4lvCy2ZL:k+PeXonnUStQXDI4spvVp+N8NECtH3T

    • Expiro family

    • Expiro, m0yv

      Expiro aka m0yv is a multi-functional backdoor written in C++.

    • Expiro payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks