General

  • Target

    JaffaCakes118_625e3a7e5f9a2cf1635b29ca6ba5517f

  • Size

    216KB

  • Sample

    250102-dymr3asrgr

  • MD5

    625e3a7e5f9a2cf1635b29ca6ba5517f

  • SHA1

    754fb2313c3983cc1a9dd5265a8e49556b6f19fa

  • SHA256

    5cdf60e819a14326c76398a12ba718764b4f0136139f817e5881e6b143f9b202

  • SHA512

    7a9893a48495aa0df77ab191720b684c31bd569aae33351dd1a25b96148cf7754d6052d163df6ba3aa7aee9c54212a12030cbd575a9eb44b1eee820ab1e2e6eb

  • SSDEEP

    3072:6HC8gubt4tiYTGsH/qQsEoIk90HgChEITlwsMqMKFOC7eHm:XUjsHyQ/HgmVwLyOvm

Malware Config

Targets

    • Target

      JaffaCakes118_625e3a7e5f9a2cf1635b29ca6ba5517f

    • Size

      216KB

    • MD5

      625e3a7e5f9a2cf1635b29ca6ba5517f

    • SHA1

      754fb2313c3983cc1a9dd5265a8e49556b6f19fa

    • SHA256

      5cdf60e819a14326c76398a12ba718764b4f0136139f817e5881e6b143f9b202

    • SHA512

      7a9893a48495aa0df77ab191720b684c31bd569aae33351dd1a25b96148cf7754d6052d163df6ba3aa7aee9c54212a12030cbd575a9eb44b1eee820ab1e2e6eb

    • SSDEEP

      3072:6HC8gubt4tiYTGsH/qQsEoIk90HgChEITlwsMqMKFOC7eHm:XUjsHyQ/HgmVwLyOvm

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks