General

  • Target

    JaffaCakes118_b42e2e1b731cca1c71a42ac0f2db617f7697668d87a29b71895f7700c24d1743

  • Size

    404KB

  • Sample

    241226-vfbqhs1qbl

  • MD5

    9eb1602b126f36c6739b7ea6a092dd4a

  • SHA1

    9df4094bcb5e21dd92ebdc75b768a6a82e327339

  • SHA256

    b42e2e1b731cca1c71a42ac0f2db617f7697668d87a29b71895f7700c24d1743

  • SHA512

    915e5eb52b295b6328325b104825337719e66854adfd522cdfffc9774219a5920765c85bd17470c95d9c4fb4d6e1883dbe2464df9ae43636abc371f4698860cc

  • SSDEEP

    6144:E/rzdc7AHraQcDf0SRnSu93wqHNZIVXxAXNdpCgCLmBBGCKwoNjfwX:4pMs9+nydWXNdpqLmBBGCdopfwX

Malware Config

Targets

    • Target

      3983BEAE2740353B08753A433BEEC30565E33B61FC4CD182DF699070EF5723BE

    • Size

      828KB

    • MD5

      00d0ecabb7335657bea410a4b836655a

    • SHA1

      64fa1f27143e13c07a123840d7e43a4a3ed225eb

    • SHA256

      3983beae2740353b08753a433beec30565e33b61fc4cd182df699070ef5723be

    • SHA512

      ee14339bd9bfd09ad24da3dce32711b90e137f0ffc0e9e383b8cfd268b792721c150fd2d7040fcf4c6b2fe76771d997a51e4be644eb69a674dfbf36b0e871267

    • SSDEEP

      24576:jObQYeKlnLiOzk3J8XszmzVTGRF3LKB2qO9pRpCBP:ybxtIFAn40k95C

    • Expiro family

    • Expiro, m0yv

      Expiro aka m0yv is a multi-functional backdoor written in C++.

    • Expiro payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Windows security modification

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks