Resubmissions

29/03/2025, 10:36 UTC

250329-mnfqfasr12 10

29/03/2025, 06:46 UTC

250329-hjwtmsyxfz 10

General

  • Target

    JaffaCakes118_8b1e36f6581f2277b0f8af5c27afea2a

  • Size

    500KB

  • Sample

    250329-mnfqfasr12

  • MD5

    8b1e36f6581f2277b0f8af5c27afea2a

  • SHA1

    e63bbfb02b21834db1890dec85669cdc93cc3978

  • SHA256

    9f1ca7fd043142e1a40113229b8764d993123647a3ea9ada7ca338f67325020e

  • SHA512

    919d39e4d25266a674c0f47de00af65a07159fe082f0d9bd9976f7b2f6f49a6a6603c47dd0a6ac89512b19a73cb579cc5b593272dd219607834b5df4fd5db2e4

  • SSDEEP

    12288:L1Tg5pBHxXptbN5ZRgOiBjw/C0AWzFjQ7H:LcH7tbrbIBjwuWR4H

Malware Config

Targets

    • Target

      JaffaCakes118_8b1e36f6581f2277b0f8af5c27afea2a

    • Size

      500KB

    • MD5

      8b1e36f6581f2277b0f8af5c27afea2a

    • SHA1

      e63bbfb02b21834db1890dec85669cdc93cc3978

    • SHA256

      9f1ca7fd043142e1a40113229b8764d993123647a3ea9ada7ca338f67325020e

    • SHA512

      919d39e4d25266a674c0f47de00af65a07159fe082f0d9bd9976f7b2f6f49a6a6603c47dd0a6ac89512b19a73cb579cc5b593272dd219607834b5df4fd5db2e4

    • SSDEEP

      12288:L1Tg5pBHxXptbN5ZRgOiBjw/C0AWzFjQ7H:LcH7tbrbIBjwuWR4H

    • Modifies WinLogon for persistence

    • Pykspa

      Pykspa is a worm spreads via Skype uses DGA and it's written in C++.

    • Pykspa family

    • Detect Pykspa worm

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Hijack Execution Flow: Executable Installer File Permissions Weakness

      Possible Turn off User Account Control's privilege elevation for standard users.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.