General

  • Target

    fe06de32fb4c4669f1a2f89bbe07ebbd_JaffaCakes118

  • Size

    60KB

  • Sample

    240421-a2vqased28

  • MD5

    fe06de32fb4c4669f1a2f89bbe07ebbd

  • SHA1

    7649c0dcc88063fb5ac2bcbac7ff667da71d3b79

  • SHA256

    a06bbb0e419c7a96625a26261b8d3d2307bcb27c724cb339f4e903bb9965d61b

  • SHA512

    cd6ad7d40a86b8bf3a4a4c226bcb0ccf7e246f9d561c0d0b043efb90f017804f06652e65a02353d52de5632909640cb49b7dd4e7e042911a7ec6c95f9c4d8ff8

  • SSDEEP

    768:3OucKn7n1JGDNANIUoLvLDwUzc80gmq3oP/oDN:3O2GDNAPkr/0O8/oB

Malware Config

Targets

    • Target

      fe06de32fb4c4669f1a2f89bbe07ebbd_JaffaCakes118

    • Size

      60KB

    • MD5

      fe06de32fb4c4669f1a2f89bbe07ebbd

    • SHA1

      7649c0dcc88063fb5ac2bcbac7ff667da71d3b79

    • SHA256

      a06bbb0e419c7a96625a26261b8d3d2307bcb27c724cb339f4e903bb9965d61b

    • SHA512

      cd6ad7d40a86b8bf3a4a4c226bcb0ccf7e246f9d561c0d0b043efb90f017804f06652e65a02353d52de5632909640cb49b7dd4e7e042911a7ec6c95f9c4d8ff8

    • SSDEEP

      768:3OucKn7n1JGDNANIUoLvLDwUzc80gmq3oP/oDN:3O2GDNAPkr/0O8/oB

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Renames multiple (76) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks