General

  • Target

    fd10d5881fbc2b6cbdc5b643d355b92b_JaffaCakes118

  • Size

    101KB

  • Sample

    241218-zl9lysskck

  • MD5

    fd10d5881fbc2b6cbdc5b643d355b92b

  • SHA1

    1c3ad1a1a546e479b53de31dac5cd4944783b406

  • SHA256

    168fd5734ac0188a4f83e948abe0a7e95661137d8d8a5abc45071fe7b538fe28

  • SHA512

    98c5a5bd27777712c1bb399f95d05b03bbe403ba502b0cc7275159046c9c2646b3f9166c222b92685297a7598e1f2c4962a1e2c40cd1a3b47e66100399018b0a

  • SSDEEP

    3072:IHZoTWiIyhD6EuGf7sHwTL/Fk8jwaaHw7Koj4r3w:oZOWidRZf7sHK

Malware Config

Targets

    • Target

      fd10d5881fbc2b6cbdc5b643d355b92b_JaffaCakes118

    • Size

      101KB

    • MD5

      fd10d5881fbc2b6cbdc5b643d355b92b

    • SHA1

      1c3ad1a1a546e479b53de31dac5cd4944783b406

    • SHA256

      168fd5734ac0188a4f83e948abe0a7e95661137d8d8a5abc45071fe7b538fe28

    • SHA512

      98c5a5bd27777712c1bb399f95d05b03bbe403ba502b0cc7275159046c9c2646b3f9166c222b92685297a7598e1f2c4962a1e2c40cd1a3b47e66100399018b0a

    • SSDEEP

      3072:IHZoTWiIyhD6EuGf7sHwTL/Fk8jwaaHw7Koj4r3w:oZOWidRZf7sHK

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks