General

  • Target

    1678b9d5bbe12efea1dbdcada72d706f_JaffaCakes118

  • Size

    4.2MB

  • Sample

    240505-hkzlxsac6w

  • MD5

    1678b9d5bbe12efea1dbdcada72d706f

  • SHA1

    f794a2ec9f20cee25dd9c0a05cfba992d63fb9f7

  • SHA256

    409cf4e571629858bc3e755ad0fc63c0f484d9ee3395bf6bf19f5b2ba0537934

  • SHA512

    253db53adcd7675bcc67a32ee718f8d88477634fd8647c54a158fa90246334ffdaa8f471c3c2320dfd1b24e070b91d2ff9e1eae0e51e74748347019e7e917022

  • SSDEEP

    98304:LW+hMSakOi/77CHohdHSia4HeOZ4BqzlVsOgJLhdy:LW++Hpia4tZ4

Malware Config

Targets

    • Target

      1678b9d5bbe12efea1dbdcada72d706f_JaffaCakes118

    • Size

      4.2MB

    • MD5

      1678b9d5bbe12efea1dbdcada72d706f

    • SHA1

      f794a2ec9f20cee25dd9c0a05cfba992d63fb9f7

    • SHA256

      409cf4e571629858bc3e755ad0fc63c0f484d9ee3395bf6bf19f5b2ba0537934

    • SHA512

      253db53adcd7675bcc67a32ee718f8d88477634fd8647c54a158fa90246334ffdaa8f471c3c2320dfd1b24e070b91d2ff9e1eae0e51e74748347019e7e917022

    • SSDEEP

      98304:LW+hMSakOi/77CHohdHSia4HeOZ4BqzlVsOgJLhdy:LW++Hpia4tZ4

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Nirsoft

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks