General

  • Target

    f1644a1e4211a4c530f2d8d6067ae142_JaffaCakes118

  • Size

    59KB

  • Sample

    240415-sy1fgsca9z

  • MD5

    f1644a1e4211a4c530f2d8d6067ae142

  • SHA1

    b0fa63f07ce28f252b73e5abc1d8656986593957

  • SHA256

    9cef668eecb19417211f27fba070c74fa5ee48a34cbaf4af3770ad3bc4ab049b

  • SHA512

    555b0c69cb304a2ed719d263b955f89f12c52ca019aa03cbfaa2e652e15e75ca7949ae056c1a35b5c567de83546d56743675976e7ba14a30d94333265fe57922

  • SSDEEP

    768:XocAX3LKew369lp2z3Sd4baFXLjwP/Tgj93b8NIocVSEFGocAX3LKew369lp2z3+:SKcR4mjD9r823FHKcR4mjD9r823FF

Malware Config

Targets

    • Target

      f1644a1e4211a4c530f2d8d6067ae142_JaffaCakes118

    • Size

      59KB

    • MD5

      f1644a1e4211a4c530f2d8d6067ae142

    • SHA1

      b0fa63f07ce28f252b73e5abc1d8656986593957

    • SHA256

      9cef668eecb19417211f27fba070c74fa5ee48a34cbaf4af3770ad3bc4ab049b

    • SHA512

      555b0c69cb304a2ed719d263b955f89f12c52ca019aa03cbfaa2e652e15e75ca7949ae056c1a35b5c567de83546d56743675976e7ba14a30d94333265fe57922

    • SSDEEP

      768:XocAX3LKew369lp2z3Sd4baFXLjwP/Tgj93b8NIocVSEFGocAX3LKew369lp2z3+:SKcR4mjD9r823FHKcR4mjD9r823FF

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks