General

  • Target

    f3ea0b41143e7afc6221f42f2503653c_JaffaCakes118

  • Size

    267KB

  • Sample

    241215-n8p1aatkgx

  • MD5

    f3ea0b41143e7afc6221f42f2503653c

  • SHA1

    c3eb377ed5ad63ad7a5fc6fd73d4101c928dac64

  • SHA256

    5512c8b42e96b051ad12fbab36689d10860d807f258a6bc1c77b4b110db5bb8e

  • SHA512

    610feccd8e78ec57a687d412e87519d4bf780aa347ee3068d9d692b263c270a96cf44b6510f7fc4a862dda0c83e062ccaf90a05a17bd16f6d8256ed51f100cfd

  • SSDEEP

    6144:OnUt0y4KIZwZIa+kP63kiYH6NyEyF3Ved54RTeJq:OnU2FHatipBNyEyF3Ve+TT

Malware Config

Targets

    • Target

      f3ea0b41143e7afc6221f42f2503653c_JaffaCakes118

    • Size

      267KB

    • MD5

      f3ea0b41143e7afc6221f42f2503653c

    • SHA1

      c3eb377ed5ad63ad7a5fc6fd73d4101c928dac64

    • SHA256

      5512c8b42e96b051ad12fbab36689d10860d807f258a6bc1c77b4b110db5bb8e

    • SHA512

      610feccd8e78ec57a687d412e87519d4bf780aa347ee3068d9d692b263c270a96cf44b6510f7fc4a862dda0c83e062ccaf90a05a17bd16f6d8256ed51f100cfd

    • SSDEEP

      6144:OnUt0y4KIZwZIa+kP63kiYH6NyEyF3Ved54RTeJq:OnU2FHatipBNyEyF3Ve+TT

    • Ammyy Admin

      Remote admin tool with various capabilities.

    • AmmyyAdmin payload

    • Ammyyadmin family

    • FlawedAmmyy RAT

      Remote-access trojan based on leaked code for the Ammyy remote admin software.

    • Flawedammyy family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks