General

  • Target

    0cfc9f28a31755aacf0dc7cf29de6042_JaffaCakes118

  • Size

    3.1MB

  • Sample

    240502-avl5ksdg54

  • MD5

    0cfc9f28a31755aacf0dc7cf29de6042

  • SHA1

    b2d3be71da6f3cdd1311d4f34f681c21de0a7156

  • SHA256

    8e166da15bf37026228a96d96de5f140bc6b77250fb647af78a427344ca69616

  • SHA512

    69e50203a91390dd80c8d5486eea13d8148d23b6d96dcd94d4fa09bf546336d07b31f888057dd2ec397d7756932e3f6c2607bde382f5b9fae01d8e7a543f8de2

  • SSDEEP

    49152:ZUuBTOjZwS1Ihk+hy7iHuaRZnt+NTNLiG97g:ZXRO0hkr2Rxt+ep

Malware Config

Targets

    • Target

      0cfc9f28a31755aacf0dc7cf29de6042_JaffaCakes118

    • Size

      3.1MB

    • MD5

      0cfc9f28a31755aacf0dc7cf29de6042

    • SHA1

      b2d3be71da6f3cdd1311d4f34f681c21de0a7156

    • SHA256

      8e166da15bf37026228a96d96de5f140bc6b77250fb647af78a427344ca69616

    • SHA512

      69e50203a91390dd80c8d5486eea13d8148d23b6d96dcd94d4fa09bf546336d07b31f888057dd2ec397d7756932e3f6c2607bde382f5b9fae01d8e7a543f8de2

    • SSDEEP

      49152:ZUuBTOjZwS1Ihk+hy7iHuaRZnt+NTNLiG97g:ZXRO0hkr2Rxt+ep

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks