General

  • Target

    JaffaCakes118_140fa1e170e2cb9a86995c09c1fa020e

  • Size

    68KB

  • Sample

    250112-vtaelstnep

  • MD5

    140fa1e170e2cb9a86995c09c1fa020e

  • SHA1

    55859f24dae9b67a2246e4e95a77bdac34ef95fa

  • SHA256

    1761d64dd37c90f67aebb7c2f17e32a918a552803b18001cb5f28d7ada8697fc

  • SHA512

    43156b782bedc426e86dd96bb090cc1bb8c4c9eef570043f85112afca8bbea840c60d267fcc7eae98f82cb3537cf182ac2ace01a659e29b866782d2e847765ad

  • SSDEEP

    768:jXzpX7m2PX2uC3P1UtKzlJsEqDlEVBRDKwsB9nMZnANQ1N/4U7rYxamg46MVpo:jDI2PX2uCUtT9DlkBRDPsBcs0WpgX6O

Malware Config

Targets

    • Target

      JaffaCakes118_140fa1e170e2cb9a86995c09c1fa020e

    • Size

      68KB

    • MD5

      140fa1e170e2cb9a86995c09c1fa020e

    • SHA1

      55859f24dae9b67a2246e4e95a77bdac34ef95fa

    • SHA256

      1761d64dd37c90f67aebb7c2f17e32a918a552803b18001cb5f28d7ada8697fc

    • SHA512

      43156b782bedc426e86dd96bb090cc1bb8c4c9eef570043f85112afca8bbea840c60d267fcc7eae98f82cb3537cf182ac2ace01a659e29b866782d2e847765ad

    • SSDEEP

      768:jXzpX7m2PX2uC3P1UtKzlJsEqDlEVBRDKwsB9nMZnANQ1N/4U7rYxamg46MVpo:jDI2PX2uCUtT9DlkBRDPsBcs0WpgX6O

    • Expiro family

    • Expiro, m0yv

      Expiro aka m0yv is a multi-functional backdoor written in C++.

    • Expiro payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks