General

  • Target

    05e64033d73526d239c4b1f06a0fccd5_JaffaCakes118

  • Size

    93KB

  • Sample

    240428-x3lkcafd2y

  • MD5

    05e64033d73526d239c4b1f06a0fccd5

  • SHA1

    1090a6a1f999b34d3ae8e4953912a20f38c463d6

  • SHA256

    b4bf2e9e3f3cddca63a753968138825c9959b0f22d49842509bc6efb2298c9d3

  • SHA512

    d5cbade4be78d9c3965a3fc4102a033015cf987ec824ed79475b1867c2571e3080c6285a055d7b0bfb0e059ed8415868566258c7dd34321528930d71d146860f

  • SSDEEP

    1536:UGjS/jdLRqInfX2D/LDsFCTnSrtSJvU3cyBOO/dh6q6ufTDf4:UGjSLdl9fXILwF2n1Jv6hp6unQ

Malware Config

Targets

    • Target

      05e64033d73526d239c4b1f06a0fccd5_JaffaCakes118

    • Size

      93KB

    • MD5

      05e64033d73526d239c4b1f06a0fccd5

    • SHA1

      1090a6a1f999b34d3ae8e4953912a20f38c463d6

    • SHA256

      b4bf2e9e3f3cddca63a753968138825c9959b0f22d49842509bc6efb2298c9d3

    • SHA512

      d5cbade4be78d9c3965a3fc4102a033015cf987ec824ed79475b1867c2571e3080c6285a055d7b0bfb0e059ed8415868566258c7dd34321528930d71d146860f

    • SSDEEP

      1536:UGjS/jdLRqInfX2D/LDsFCTnSrtSJvU3cyBOO/dh6q6ufTDf4:UGjSLdl9fXILwF2n1Jv6hp6unQ

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks