General

  • Target

    JaffaCakes118_7bf2c52e5b861044dce471293247f3926cb7fc8c

  • Size

    148.7MB

  • Sample

    241223-qwgt9a1lhm

  • MD5

    38036a70b4ed531dadb58f36408871f0

  • SHA1

    7bf2c52e5b861044dce471293247f3926cb7fc8c

  • SHA256

    6e0775e91dc304bdccef41ad8996aeb886c4d8378dc6f7d9a8789b2739777b32

  • SHA512

    d534c5b00157f9bc49e2edf23b952d5bb4a364969027d1079059a4a9bb3753ed3584b7ec601e8ba608f1ee5fd5f20e0f2cc9986d5b1015a18538dd868301b938

  • SSDEEP

    3145728:bJ3y6Y5xCztM7YOY65971/AG5xCztM7YOY65971hJ3ZR66:t3yFzGGkOYCnAGzGGkOYC33m

Malware Config

Targets

    • Target

      JaffaCakes118_7bf2c52e5b861044dce471293247f3926cb7fc8c

    • Size

      148.7MB

    • MD5

      38036a70b4ed531dadb58f36408871f0

    • SHA1

      7bf2c52e5b861044dce471293247f3926cb7fc8c

    • SHA256

      6e0775e91dc304bdccef41ad8996aeb886c4d8378dc6f7d9a8789b2739777b32

    • SHA512

      d534c5b00157f9bc49e2edf23b952d5bb4a364969027d1079059a4a9bb3753ed3584b7ec601e8ba608f1ee5fd5f20e0f2cc9986d5b1015a18538dd868301b938

    • SSDEEP

      3145728:bJ3y6Y5xCztM7YOY65971/AG5xCztM7YOY65971hJ3ZR66:t3yFzGGkOYCnAGzGGkOYC33m

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Mercurialgrabber family

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Looks for VirtualBox Guest Additions in registry

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Modifies Security services

      Modifies the startup behavior of a security service.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks