General

  • Target

    045eb07a813c75105b31480ed74f5f4e_JaffaCakes118

  • Size

    13.3MB

  • Sample

    240428-e2b1eagd2w

  • MD5

    045eb07a813c75105b31480ed74f5f4e

  • SHA1

    d4f8283514e8acbd8aaa1cb6dff3aa126d24cd1e

  • SHA256

    fb68c68c00108c78502420c20ed5626ee4e8bb1741b795192d5a3f464dfb6658

  • SHA512

    c00ccbfb504d199e0f8059b71e89d28cd95b8e698c55a76e0abe0f62d52e785ae81510a27e28adac1ae3826022ef05b65a8a9971138009bcef2ca840745fec2d

  • SSDEEP

    49152:XYgph7GBfWbYcMh2RAR5FeA6wAqC1xDkYOMwwnMb4PmyVAK:XX77GBfWb5uW1cYOXwnS4rVAK

Malware Config

Targets

    • Target

      045eb07a813c75105b31480ed74f5f4e_JaffaCakes118

    • Size

      13.3MB

    • MD5

      045eb07a813c75105b31480ed74f5f4e

    • SHA1

      d4f8283514e8acbd8aaa1cb6dff3aa126d24cd1e

    • SHA256

      fb68c68c00108c78502420c20ed5626ee4e8bb1741b795192d5a3f464dfb6658

    • SHA512

      c00ccbfb504d199e0f8059b71e89d28cd95b8e698c55a76e0abe0f62d52e785ae81510a27e28adac1ae3826022ef05b65a8a9971138009bcef2ca840745fec2d

    • SSDEEP

      49152:XYgph7GBfWbYcMh2RAR5FeA6wAqC1xDkYOMwwnMb4PmyVAK:XX77GBfWb5uW1cYOXwnS4rVAK

    • Contacts a large (885) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Network Service Discovery

1
T1046

Collection

Data from Local System

1
T1005

Tasks