General

  • Target

    291d6827023eb539140aaa47e1a738b5_JaffaCakes118

  • Size

    170KB

  • Sample

    240509-kdj9rshb41

  • MD5

    291d6827023eb539140aaa47e1a738b5

  • SHA1

    46430909d37c4e0b61ca5cf27561fc35bf1972a8

  • SHA256

    2ef159951ee7bc03135a9e6a14d5d7e87734475aacfe237d1094aa0728333940

  • SHA512

    679207fe3f5114019edb3b0f306e33afd1e99b7a7fa168a5713b1b8160a35360a5e7a8d4adbf0d5767fd317a90f319944e63a2c99ce80812c1c9bd77d072daea

  • SSDEEP

    3072:+5ERKdsNSE8jWf+FnGevgjFA+WzmLpJhJ4RpS:+wB8qonGeoFA0lyp

Malware Config

Targets

    • Target

      291d6827023eb539140aaa47e1a738b5_JaffaCakes118

    • Size

      170KB

    • MD5

      291d6827023eb539140aaa47e1a738b5

    • SHA1

      46430909d37c4e0b61ca5cf27561fc35bf1972a8

    • SHA256

      2ef159951ee7bc03135a9e6a14d5d7e87734475aacfe237d1094aa0728333940

    • SHA512

      679207fe3f5114019edb3b0f306e33afd1e99b7a7fa168a5713b1b8160a35360a5e7a8d4adbf0d5767fd317a90f319944e63a2c99ce80812c1c9bd77d072daea

    • SSDEEP

      3072:+5ERKdsNSE8jWf+FnGevgjFA+WzmLpJhJ4RpS:+wB8qonGeoFA0lyp

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks