General

  • Target

    JaffaCakes118_63da91ae47b722d57e5c1ae562c52241

  • Size

    510KB

  • Sample

    250102-khlndstmev

  • MD5

    63da91ae47b722d57e5c1ae562c52241

  • SHA1

    7813d15aaa44edf7f1ddae94a8664f91eb1b17d0

  • SHA256

    738f2911f4786d927b4dc24f55edbbba8415cbcb7bb3c8fecbcea7cf4f170add

  • SHA512

    92b82f05685c8593713659c98db833342fbdb5041c82d641246dd4037441a427b5d1eb77b7cdb30b1b3202409fce2af346c36673985670f672aa1761e7089225

  • SSDEEP

    12288:eLWrIYvqnklSYARvJYi3zStRBoN37KQGOMqWnGFH0hNWsb:eLWrTqkorRv2i+tRiN37tvHUIQ

Malware Config

Targets

    • Target

      JaffaCakes118_63da91ae47b722d57e5c1ae562c52241

    • Size

      510KB

    • MD5

      63da91ae47b722d57e5c1ae562c52241

    • SHA1

      7813d15aaa44edf7f1ddae94a8664f91eb1b17d0

    • SHA256

      738f2911f4786d927b4dc24f55edbbba8415cbcb7bb3c8fecbcea7cf4f170add

    • SHA512

      92b82f05685c8593713659c98db833342fbdb5041c82d641246dd4037441a427b5d1eb77b7cdb30b1b3202409fce2af346c36673985670f672aa1761e7089225

    • SSDEEP

      12288:eLWrIYvqnklSYARvJYi3zStRBoN37KQGOMqWnGFH0hNWsb:eLWrTqkorRv2i+tRiN37tvHUIQ

    • Modifies WinLogon for persistence

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • UAC bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks