General

  • Target

    138dd6f0c549b0e7facab17d5da7833a_JaffaCakes118

  • Size

    4.1MB

  • Sample

    240504-tyzpmabb8t

  • MD5

    138dd6f0c549b0e7facab17d5da7833a

  • SHA1

    0874bbfb1316308533e6b243766480d3fa7af9d4

  • SHA256

    f3635ffdfa0773be8da45f4bbcc25a2b962f92f62ee03de853d9feac0c3dc277

  • SHA512

    160889bfb723fb94c35e86ea159383f4e4e4e09c8f373bc887eee3d38f48007d86888c9d0ce29a0a0f84cd20e30784591888acff450884c60f4ec71db741f49c

  • SSDEEP

    98304:sOgxAmHCpxpfKYBHKOJx2nn5NkO3vfPw/fm1hf+t:NmHYxFBqI2nn5NkO3uuhf

Malware Config

Targets

    • Target

      138dd6f0c549b0e7facab17d5da7833a_JaffaCakes118

    • Size

      4.1MB

    • MD5

      138dd6f0c549b0e7facab17d5da7833a

    • SHA1

      0874bbfb1316308533e6b243766480d3fa7af9d4

    • SHA256

      f3635ffdfa0773be8da45f4bbcc25a2b962f92f62ee03de853d9feac0c3dc277

    • SHA512

      160889bfb723fb94c35e86ea159383f4e4e4e09c8f373bc887eee3d38f48007d86888c9d0ce29a0a0f84cd20e30784591888acff450884c60f4ec71db741f49c

    • SSDEEP

      98304:sOgxAmHCpxpfKYBHKOJx2nn5NkO3vfPw/fm1hf+t:NmHYxFBqI2nn5NkO3uuhf

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Nirsoft

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks