General

  • Target

    fefa8c4841935d8e464b1b309d4d998e_JaffaCakes118

  • Size

    21KB

  • Sample

    240421-lh5xpsgd8z

  • MD5

    fefa8c4841935d8e464b1b309d4d998e

  • SHA1

    5bc83e8cf88aaae903f108f0b1bc187cb040c666

  • SHA256

    0634d9b060874c8b3c47f3e4242aba909172a8d305a7953720506e6a52becd2a

  • SHA512

    2282c4360f80e495c5542751e1ae964929ed0853c10f52e350280912beb82b5080c9d4892eabfa003cbe47cd008a4b751dc06c9d75f07536a9d72d845ae3e3c1

  • SSDEEP

    384:EdvsElH32qu8thLWrDLZWAxKBGYJLWCibcC/Viqis9QlcffyqGenA:zEJumKLRK/LAbhisKl4qRT

Malware Config

Targets

    • Target

      fefa8c4841935d8e464b1b309d4d998e_JaffaCakes118

    • Size

      21KB

    • MD5

      fefa8c4841935d8e464b1b309d4d998e

    • SHA1

      5bc83e8cf88aaae903f108f0b1bc187cb040c666

    • SHA256

      0634d9b060874c8b3c47f3e4242aba909172a8d305a7953720506e6a52becd2a

    • SHA512

      2282c4360f80e495c5542751e1ae964929ed0853c10f52e350280912beb82b5080c9d4892eabfa003cbe47cd008a4b751dc06c9d75f07536a9d72d845ae3e3c1

    • SSDEEP

      384:EdvsElH32qu8thLWrDLZWAxKBGYJLWCibcC/Viqis9QlcffyqGenA:zEJumKLRK/LAbhisKl4qRT

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks