General

  • Target

    fddfeed85f23b84971cea9b28a9f4744_JaffaCakes118

  • Size

    4.9MB

  • Sample

    240420-273rmscd96

  • MD5

    fddfeed85f23b84971cea9b28a9f4744

  • SHA1

    fe5fb6eda0f25239bc0b83c8b50bfbad95f74386

  • SHA256

    dbed3399932fabe6f7f863403279ac9a6b075aa307dd445df2c7060157d3063b

  • SHA512

    ceec384f751e31492856ba70aad450c94b7c1f06e2acae8eb514d7b1facb6a0a5ff3ee28f6da264834829c3de9456017c46e4d63db7f54c1ab12d5985294832b

  • SSDEEP

    768:E7uMqCXfB0nnpnkWCANIUazGLDwUzc80gmq3oP/oDH:E7uDn1k5APHr/0O8/oj

Malware Config

Targets

    • Target

      fddfeed85f23b84971cea9b28a9f4744_JaffaCakes118

    • Size

      4.9MB

    • MD5

      fddfeed85f23b84971cea9b28a9f4744

    • SHA1

      fe5fb6eda0f25239bc0b83c8b50bfbad95f74386

    • SHA256

      dbed3399932fabe6f7f863403279ac9a6b075aa307dd445df2c7060157d3063b

    • SHA512

      ceec384f751e31492856ba70aad450c94b7c1f06e2acae8eb514d7b1facb6a0a5ff3ee28f6da264834829c3de9456017c46e4d63db7f54c1ab12d5985294832b

    • SSDEEP

      768:E7uMqCXfB0nnpnkWCANIUazGLDwUzc80gmq3oP/oDH:E7uDn1k5APHr/0O8/oj

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Renames multiple (62) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks