General

  • Target

    JaffaCakes118_625e3a7e5f9a2cf1635b29ca6ba5517f

  • Size

    216KB

  • Sample

    250102-dymr3asrgr

  • MD5

    625e3a7e5f9a2cf1635b29ca6ba5517f

  • SHA1

    754fb2313c3983cc1a9dd5265a8e49556b6f19fa

  • SHA256

    5cdf60e819a14326c76398a12ba718764b4f0136139f817e5881e6b143f9b202

  • SHA512

    7a9893a48495aa0df77ab191720b684c31bd569aae33351dd1a25b96148cf7754d6052d163df6ba3aa7aee9c54212a12030cbd575a9eb44b1eee820ab1e2e6eb

  • SSDEEP

    3072:6HC8gubt4tiYTGsH/qQsEoIk90HgChEITlwsMqMKFOC7eHm:XUjsHyQ/HgmVwLyOvm

Malware Config

Targets

    • Target

      JaffaCakes118_625e3a7e5f9a2cf1635b29ca6ba5517f

    • Size

      216KB

    • MD5

      625e3a7e5f9a2cf1635b29ca6ba5517f

    • SHA1

      754fb2313c3983cc1a9dd5265a8e49556b6f19fa

    • SHA256

      5cdf60e819a14326c76398a12ba718764b4f0136139f817e5881e6b143f9b202

    • SHA512

      7a9893a48495aa0df77ab191720b684c31bd569aae33351dd1a25b96148cf7754d6052d163df6ba3aa7aee9c54212a12030cbd575a9eb44b1eee820ab1e2e6eb

    • SSDEEP

      3072:6HC8gubt4tiYTGsH/qQsEoIk90HgChEITlwsMqMKFOC7eHm:XUjsHyQ/HgmVwLyOvm

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.