General

  • Target

    f7def9ec25e201afcc84f03322e8e26b_JaffaCakes118

  • Size

    341KB

  • Sample

    240418-m8mdqace4t

  • MD5

    f7def9ec25e201afcc84f03322e8e26b

  • SHA1

    98738ecc5a1ab5f3e40684517053a4e3c2533dc6

  • SHA256

    94c6f501ab7d1464dd130b548ca42b2a53c3cf4b7b3c685f453336b309201ad4

  • SHA512

    1ebcc5a7f0fb6abefec6d535955f8d45829b3e980813819039427e1ffc7900ce0da34baf66c67a803c77162729548aa360eef0c9f1558ebcbf64d9987f9fc797

  • SSDEEP

    6144:hG3GddsOZcnNNvzNQVI/cXDS+JhwNR/rjSAIIm9hEaV2ukaENI:hsGddsO+nLEbu+JuH/rJohEa

Malware Config

Targets

    • Target

      f7def9ec25e201afcc84f03322e8e26b_JaffaCakes118

    • Size

      341KB

    • MD5

      f7def9ec25e201afcc84f03322e8e26b

    • SHA1

      98738ecc5a1ab5f3e40684517053a4e3c2533dc6

    • SHA256

      94c6f501ab7d1464dd130b548ca42b2a53c3cf4b7b3c685f453336b309201ad4

    • SHA512

      1ebcc5a7f0fb6abefec6d535955f8d45829b3e980813819039427e1ffc7900ce0da34baf66c67a803c77162729548aa360eef0c9f1558ebcbf64d9987f9fc797

    • SSDEEP

      6144:hG3GddsOZcnNNvzNQVI/cXDS+JhwNR/rjSAIIm9hEaV2ukaENI:hsGddsO+nLEbu+JuH/rJohEa

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks