General

  • Target

    JaffaCakes118_13dc27bef19cb6850aa3a171c994eeee

  • Size

    124KB

  • Sample

    250221-t2jskswjel

  • MD5

    13dc27bef19cb6850aa3a171c994eeee

  • SHA1

    a77cce9dd9e89e13713da9c735901e194914de27

  • SHA256

    de1b68d8d9b15839a1df82d21fed1cdf7242a9e61015c0d091d12e8e738406f4

  • SHA512

    68d878f223a8e775e5c3acf4b45b50cf31264ef10bf7b186ff61620ba6f7e02874e458427734154adf39d225fd83ee62be3a6631f8fe7d0e950d2d48f8b41471

  • SSDEEP

    3072:cScKZB3QoLogf+lLtj7nl5vc0TtohHmlout:cScsjo2+LpY0T6mloS

Malware Config

Targets

    • Target

      JaffaCakes118_13dc27bef19cb6850aa3a171c994eeee

    • Size

      124KB

    • MD5

      13dc27bef19cb6850aa3a171c994eeee

    • SHA1

      a77cce9dd9e89e13713da9c735901e194914de27

    • SHA256

      de1b68d8d9b15839a1df82d21fed1cdf7242a9e61015c0d091d12e8e738406f4

    • SHA512

      68d878f223a8e775e5c3acf4b45b50cf31264ef10bf7b186ff61620ba6f7e02874e458427734154adf39d225fd83ee62be3a6631f8fe7d0e950d2d48f8b41471

    • SSDEEP

      3072:cScKZB3QoLogf+lLtj7nl5vc0TtohHmlout:cScsjo2+LpY0T6mloS

    • Blackmoon family

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Drops file in Drivers directory

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks