General

  • Target

    aa8c2a0315d53e5c91839e56bc3fde0e_JaffaCakes118

  • Size

    10.8MB

  • Sample

    240614-tctlgs1dll

  • MD5

    aa8c2a0315d53e5c91839e56bc3fde0e

  • SHA1

    deff7fd2212fa8ce7400b21e7ff1de8cbef3e156

  • SHA256

    a7279a644571d8eda00d346261ed01042919ae914274269fec6d027cfce240ea

  • SHA512

    89882e84ae871da23393c81363d970c922ae25578e64627326d29471a4230885c0a9c20524086f14e8d925d4fef99ac8d8cb9edf41b15f9dd475a4191cd56fa9

  • SSDEEP

    196608:Y+1nHvT1kGoZwbkoqygNSHm2hOfse03r5qQB1aR5id30a4wEb+px6Q6RY5:Y+1n2GoN+nmmOjer5rsX+T4wG+d

Malware Config

Targets

    • Target

      aa8c2a0315d53e5c91839e56bc3fde0e_JaffaCakes118

    • Size

      10.8MB

    • MD5

      aa8c2a0315d53e5c91839e56bc3fde0e

    • SHA1

      deff7fd2212fa8ce7400b21e7ff1de8cbef3e156

    • SHA256

      a7279a644571d8eda00d346261ed01042919ae914274269fec6d027cfce240ea

    • SHA512

      89882e84ae871da23393c81363d970c922ae25578e64627326d29471a4230885c0a9c20524086f14e8d925d4fef99ac8d8cb9edf41b15f9dd475a4191cd56fa9

    • SSDEEP

      196608:Y+1nHvT1kGoZwbkoqygNSHm2hOfse03r5qQB1aR5id30a4wEb+px6Q6RY5:Y+1n2GoN+nmmOjer5rsX+T4wG+d

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks