General

  • Target

    ec67b6b3904d22dce5c74fc4f305ca1e_JaffaCakes118

  • Size

    4.3MB

  • Sample

    240411-bz66zsbh6y

  • MD5

    ec67b6b3904d22dce5c74fc4f305ca1e

  • SHA1

    6d3b9eba47459d7782c6109efb8c4093b872054c

  • SHA256

    cb10ba522d71b68ab8cc497dced558921c00d9eeee96cfdbc5d3317c10340bd4

  • SHA512

    fa2e18a43b8a6eee43b52bfc2d74b4bfcac0db6d756b98992bd2600d96279dadf68323b3d378f3ec24444a82625817880cc41bd206d9c71aece2bf4e7c2cda8f

  • SSDEEP

    98304:za1/XoFi0fijLHspsndb2+vImMyAewTzsPjpZb/fazCTkkI1lifo6Og28:zqgFilM2ndbHwTfe6qjTVkkGko5gJ

Malware Config

Targets

    • Target

      ec67b6b3904d22dce5c74fc4f305ca1e_JaffaCakes118

    • Size

      4.3MB

    • MD5

      ec67b6b3904d22dce5c74fc4f305ca1e

    • SHA1

      6d3b9eba47459d7782c6109efb8c4093b872054c

    • SHA256

      cb10ba522d71b68ab8cc497dced558921c00d9eeee96cfdbc5d3317c10340bd4

    • SHA512

      fa2e18a43b8a6eee43b52bfc2d74b4bfcac0db6d756b98992bd2600d96279dadf68323b3d378f3ec24444a82625817880cc41bd206d9c71aece2bf4e7c2cda8f

    • SSDEEP

      98304:za1/XoFi0fijLHspsndb2+vImMyAewTzsPjpZb/fazCTkkI1lifo6Og28:zqgFilM2ndbHwTfe6qjTVkkGko5gJ

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks