General

  • Target

    JaffaCakes118_60e97855390ec54f42e0eed0214eefd3

  • Size

    98KB

  • Sample

    250101-1y6aqsxjas

  • MD5

    60e97855390ec54f42e0eed0214eefd3

  • SHA1

    fb8920870430261294ba0b417f4ea047b9c7b49c

  • SHA256

    252ebbc2fcd881312157fa2b911affed397d5e082fd85a54a5ed4227a59b2b06

  • SHA512

    8602e4df4cef5772ae7858455d62aeef256f37b078cab0413dd73eec3f4df9659d9f0ef41ed88ed8e6d227f0b4155f900927ad66bf92d8421c639a4346e6b34c

  • SSDEEP

    1536:sTXB+5p3Bi+HpM4tmJIxqG0/7vd8xUxPpZzmFOcVf2nxqG0/7vdIgJ:sTs3BxJNmJIxqdLdT/ZzmEZxqdLdDJ

Malware Config

Targets

    • Target

      JaffaCakes118_60e97855390ec54f42e0eed0214eefd3

    • Size

      98KB

    • MD5

      60e97855390ec54f42e0eed0214eefd3

    • SHA1

      fb8920870430261294ba0b417f4ea047b9c7b49c

    • SHA256

      252ebbc2fcd881312157fa2b911affed397d5e082fd85a54a5ed4227a59b2b06

    • SHA512

      8602e4df4cef5772ae7858455d62aeef256f37b078cab0413dd73eec3f4df9659d9f0ef41ed88ed8e6d227f0b4155f900927ad66bf92d8421c639a4346e6b34c

    • SSDEEP

      1536:sTXB+5p3Bi+HpM4tmJIxqG0/7vd8xUxPpZzmFOcVf2nxqG0/7vdIgJ:sTs3BxJNmJIxqdLdT/ZzmEZxqdLdDJ

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks