General

  • Target

    701820afc26b023402b5869eb9a2c832_JaffaCakes118

  • Size

    4.1MB

  • Sample

    240524-23z5ysed5t

  • MD5

    701820afc26b023402b5869eb9a2c832

  • SHA1

    d3741e6728b248dc2786ce7740034ce3c23996ef

  • SHA256

    1e83ae1550dd4795e067e873514fa1a6f31881be3cb23adf6f5b93f37d50d8c2

  • SHA512

    872e053e127f503f1376375e82b680680d4508d6468038a5e212d1198ba1cb44aa0f97b46a864eaaeb9b1baae8f7c004229c6560619e586fd999618524edc4c1

  • SSDEEP

    98304:U3iwcOgL8+O0J6UMoWFhygoWbsbXqFEYbmSv8:Uy7TJ6CWPyg8baE4

Malware Config

Targets

    • Target

      701820afc26b023402b5869eb9a2c832_JaffaCakes118

    • Size

      4.1MB

    • MD5

      701820afc26b023402b5869eb9a2c832

    • SHA1

      d3741e6728b248dc2786ce7740034ce3c23996ef

    • SHA256

      1e83ae1550dd4795e067e873514fa1a6f31881be3cb23adf6f5b93f37d50d8c2

    • SHA512

      872e053e127f503f1376375e82b680680d4508d6468038a5e212d1198ba1cb44aa0f97b46a864eaaeb9b1baae8f7c004229c6560619e586fd999618524edc4c1

    • SSDEEP

      98304:U3iwcOgL8+O0J6UMoWFhygoWbsbXqFEYbmSv8:Uy7TJ6CWPyg8baE4

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Nirsoft

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks