General

  • Target

    JaffaCakes118_8e0cc35a04712658755155d432aabb10

  • Size

    572KB

  • Sample

    250329-v6rvesyvbv

  • MD5

    8e0cc35a04712658755155d432aabb10

  • SHA1

    e1a4223e46efab110bdce0c7ff7e7fd1839a2584

  • SHA256

    1364c5f9a11996c761040823e43e41547f52147aafd7fc4bf910d98a4c30eacb

  • SHA512

    715d0d2d1fad9171567d2b4a0f2efcfa6259c065d99272a3384e4f04aa8955ccc228b6d10de12a0e0205435b691eb35c8799541d97cd603e07e3f03f190637d6

  • SSDEEP

    6144:88XXRUw9Oz5+iUU03pej1YpTYzOb0kLXhlJFTaLTGu0yvHcr+JB8aU:PnRy+ZyYpaCDJFuPyAHcqrU

Malware Config

Targets

    • Target

      JaffaCakes118_8e0cc35a04712658755155d432aabb10

    • Size

      572KB

    • MD5

      8e0cc35a04712658755155d432aabb10

    • SHA1

      e1a4223e46efab110bdce0c7ff7e7fd1839a2584

    • SHA256

      1364c5f9a11996c761040823e43e41547f52147aafd7fc4bf910d98a4c30eacb

    • SHA512

      715d0d2d1fad9171567d2b4a0f2efcfa6259c065d99272a3384e4f04aa8955ccc228b6d10de12a0e0205435b691eb35c8799541d97cd603e07e3f03f190637d6

    • SSDEEP

      6144:88XXRUw9Oz5+iUU03pej1YpTYzOb0kLXhlJFTaLTGu0yvHcr+JB8aU:PnRy+ZyYpaCDJFuPyAHcqrU

    • Modifies WinLogon for persistence

    • Pykspa

      Pykspa is a worm spreads via Skype uses DGA and it's written in C++.

    • Pykspa family

    • Detect Pykspa worm

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Hijack Execution Flow: Executable Installer File Permissions Weakness

      Possible Turn off User Account Control's privilege elevation for standard users.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks