General

  • Target

    9a1725b1db1d41e3718526e265a8c6fb_JaffaCakes118

  • Size

    355KB

  • Sample

    240402-3hzt5agh2x

  • MD5

    9a1725b1db1d41e3718526e265a8c6fb

  • SHA1

    3f38ead3e0ce0d8ae516465e2bcad43cf1dd8970

  • SHA256

    e31898f207733cf33a6f951d8337d6cd303334a9df95956686657e3f13436ae8

  • SHA512

    142ef77760974c044061214dce1597599315ea08ffe12627500d3a0f71e8b290e33a3d97372439f3b01f57f2282549ce7143b033180e2584b56e25ab99e60bc7

  • SSDEEP

    6144:BeiSscyk7I05DgnncrqB4MKqeuR9pO0iS2TBBQxKMedx2isuXuKnJtyK5iHI:zl12TAisuX/Jtd

Malware Config

Targets

    • Target

      9a1725b1db1d41e3718526e265a8c6fb_JaffaCakes118

    • Size

      355KB

    • MD5

      9a1725b1db1d41e3718526e265a8c6fb

    • SHA1

      3f38ead3e0ce0d8ae516465e2bcad43cf1dd8970

    • SHA256

      e31898f207733cf33a6f951d8337d6cd303334a9df95956686657e3f13436ae8

    • SHA512

      142ef77760974c044061214dce1597599315ea08ffe12627500d3a0f71e8b290e33a3d97372439f3b01f57f2282549ce7143b033180e2584b56e25ab99e60bc7

    • SSDEEP

      6144:BeiSscyk7I05DgnncrqB4MKqeuR9pO0iS2TBBQxKMedx2isuXuKnJtyK5iHI:zl12TAisuX/Jtd

    • Bazar Loader

      Detected loader normally used to deploy BazarBackdoor malware.

    • Bazar/Team9 Loader payload

    • Blocklisted process makes network request

    • Tries to connect to .bazar domain

      Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Tasks