Resubmissions

29/03/2025, 10:36

250329-mnfqfasr12 10

29/03/2025, 06:46

250329-hjwtmsyxfz 10

General

  • Target

    JaffaCakes118_8b1e36f6581f2277b0f8af5c27afea2a

  • Size

    500KB

  • Sample

    250329-hjwtmsyxfz

  • MD5

    8b1e36f6581f2277b0f8af5c27afea2a

  • SHA1

    e63bbfb02b21834db1890dec85669cdc93cc3978

  • SHA256

    9f1ca7fd043142e1a40113229b8764d993123647a3ea9ada7ca338f67325020e

  • SHA512

    919d39e4d25266a674c0f47de00af65a07159fe082f0d9bd9976f7b2f6f49a6a6603c47dd0a6ac89512b19a73cb579cc5b593272dd219607834b5df4fd5db2e4

  • SSDEEP

    12288:L1Tg5pBHxXptbN5ZRgOiBjw/C0AWzFjQ7H:LcH7tbrbIBjwuWR4H

Malware Config

Targets

    • Target

      JaffaCakes118_8b1e36f6581f2277b0f8af5c27afea2a

    • Size

      500KB

    • MD5

      8b1e36f6581f2277b0f8af5c27afea2a

    • SHA1

      e63bbfb02b21834db1890dec85669cdc93cc3978

    • SHA256

      9f1ca7fd043142e1a40113229b8764d993123647a3ea9ada7ca338f67325020e

    • SHA512

      919d39e4d25266a674c0f47de00af65a07159fe082f0d9bd9976f7b2f6f49a6a6603c47dd0a6ac89512b19a73cb579cc5b593272dd219607834b5df4fd5db2e4

    • SSDEEP

      12288:L1Tg5pBHxXptbN5ZRgOiBjw/C0AWzFjQ7H:LcH7tbrbIBjwuWR4H

    • Modifies WinLogon for persistence

    • Pykspa

      Pykspa is a worm spreads via Skype uses DGA and it's written in C++.

    • Pykspa family

    • Detect Pykspa worm

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Hijack Execution Flow: Executable Installer File Permissions Weakness

      Possible Turn off User Account Control's privilege elevation for standard users.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks