General

  • Target

    JaffaCakes118_2d5c72594a039e997ed9a75c71bcfd64

  • Size

    60KB

  • Sample

    250113-xpws6awlcq

  • MD5

    2d5c72594a039e997ed9a75c71bcfd64

  • SHA1

    23fe5f874ca9a07a560730aef1372e9b567340cc

  • SHA256

    1fe3728fef2f2a8a58ff0ff45ae4d4b6d957d2eed5f2c6636103518818029a1d

  • SHA512

    93a3512c354171626b7be1699b11b69b601c99cfbd189ee23d852419b657fabaffb94359ce876702ad50f85ed3f281b11240fe48f335f676c6b4caf2fbf3961f

  • SSDEEP

    768:hE30e/7tEaWcArSwaydTb0EroSd3QXGsBS4sZFFSUv6GfEK+RsWW2qTN4lvCy2ZL:++PeXonnUStQXDI4spvVp+N8NECtH3T

Malware Config

Targets

    • Target

      JaffaCakes118_2d5c72594a039e997ed9a75c71bcfd64

    • Size

      60KB

    • MD5

      2d5c72594a039e997ed9a75c71bcfd64

    • SHA1

      23fe5f874ca9a07a560730aef1372e9b567340cc

    • SHA256

      1fe3728fef2f2a8a58ff0ff45ae4d4b6d957d2eed5f2c6636103518818029a1d

    • SHA512

      93a3512c354171626b7be1699b11b69b601c99cfbd189ee23d852419b657fabaffb94359ce876702ad50f85ed3f281b11240fe48f335f676c6b4caf2fbf3961f

    • SSDEEP

      768:hE30e/7tEaWcArSwaydTb0EroSd3QXGsBS4sZFFSUv6GfEK+RsWW2qTN4lvCy2ZL:++PeXonnUStQXDI4spvVp+N8NECtH3T

    • Expiro family

    • Expiro, m0yv

      Expiro aka m0yv is a multi-functional backdoor written in C++.

    • Expiro payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks