General

  • Target

    1a89b7d4fb8ded72e1f8e81ee9352262_JaffaCakes118

  • Size

    298KB

  • Sample

    240701-jzklzstflr

  • MD5

    1a89b7d4fb8ded72e1f8e81ee9352262

  • SHA1

    3124893ffd96050e924ad003704c6144fde50ac3

  • SHA256

    3588af3f2e0bd35d34ae5dcc2e9ec9c303be9607bb5ec82acd36d856894da65c

  • SHA512

    77edf5e933116f190d8aec898c53d2ce93b8f12a1e5991eb2eb94f2c8527a82744308a5c093a238cf1d04de63080f2b37e167343531931c2e682e404a0ec2f0a

  • SSDEEP

    6144:OCXTds8F4aKZJ2sg01CFBK3gbKaC2JDfTFX+L4YF+GX1D/+zH5+zNaP:FoZ6Lb5C4f4L4YFFFdzYP

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    canon222.aiq.ru
  • Port:
    21
  • Username:
    u380797
  • Password:
    wly1fs7n

Targets

    • Target

      1a89b7d4fb8ded72e1f8e81ee9352262_JaffaCakes118

    • Size

      298KB

    • MD5

      1a89b7d4fb8ded72e1f8e81ee9352262

    • SHA1

      3124893ffd96050e924ad003704c6144fde50ac3

    • SHA256

      3588af3f2e0bd35d34ae5dcc2e9ec9c303be9607bb5ec82acd36d856894da65c

    • SHA512

      77edf5e933116f190d8aec898c53d2ce93b8f12a1e5991eb2eb94f2c8527a82744308a5c093a238cf1d04de63080f2b37e167343531931c2e682e404a0ec2f0a

    • SSDEEP

      6144:OCXTds8F4aKZJ2sg01CFBK3gbKaC2JDfTFX+L4YF+GX1D/+zH5+zNaP:FoZ6Lb5C4f4L4YFFFdzYP

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks