General

  • Target

    JaffaCakes118_e46c55a543092797f9f3395240b0d722

  • Size

    1.7MB

  • Sample

    250211-ka134s1lan

  • MD5

    e46c55a543092797f9f3395240b0d722

  • SHA1

    c42485b4bde8ddb0502f53ec0e95c9592ebc4db0

  • SHA256

    98bbc616347efeefb3172d20cfcbcf542a1ada7f0665bc970196ae6607bcff23

  • SHA512

    4b362599075dc40b212a4988628c62f2a82223ca16d0a6415340e304a2a380383669487f12a088e05a26ff79d8e8fc0f580c76c942cad7be6d4ea26f263551c9

  • SSDEEP

    49152:n6VP9rFuM6zG89WDU49bNgl8unxDpYYp1HzCcpg:6DrVLF9ba/nxmIzC

Malware Config

Targets

    • Target

      JaffaCakes118_e46c55a543092797f9f3395240b0d722

    • Size

      1.7MB

    • MD5

      e46c55a543092797f9f3395240b0d722

    • SHA1

      c42485b4bde8ddb0502f53ec0e95c9592ebc4db0

    • SHA256

      98bbc616347efeefb3172d20cfcbcf542a1ada7f0665bc970196ae6607bcff23

    • SHA512

      4b362599075dc40b212a4988628c62f2a82223ca16d0a6415340e304a2a380383669487f12a088e05a26ff79d8e8fc0f580c76c942cad7be6d4ea26f263551c9

    • SSDEEP

      49152:n6VP9rFuM6zG89WDU49bNgl8unxDpYYp1HzCcpg:6DrVLF9ba/nxmIzC

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks