General

  • Target

    430ff7de70c4c222c31a534baddd5d90_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240514-zvm5bagg69

  • MD5

    430ff7de70c4c222c31a534baddd5d90

  • SHA1

    ede6a96d88b8cdacdc4184321bdfacb22ed2ff95

  • SHA256

    7fd4cb9adfa0303e0d765fe465beec05e33ad75806a7e3b5ea8bb58535e3189f

  • SHA512

    ca207a6c3a9fbdef0647c2fc13663fe5268cc507ed6d452f65ea21aedc15f8a2518160d9c7d79472168c703a86b2c0d1469e21a16c9c066daf497d7790e7783d

  • SSDEEP

    24576:Y7kYHfY+I9kiD+GI1c7gb6Xa+7XnFmc0rCZfEuPhP+7:YRw7gben0rofDhu

Malware Config

Targets

    • Target

      430ff7de70c4c222c31a534baddd5d90_JaffaCakes118

    • Size

      1.1MB

    • MD5

      430ff7de70c4c222c31a534baddd5d90

    • SHA1

      ede6a96d88b8cdacdc4184321bdfacb22ed2ff95

    • SHA256

      7fd4cb9adfa0303e0d765fe465beec05e33ad75806a7e3b5ea8bb58535e3189f

    • SHA512

      ca207a6c3a9fbdef0647c2fc13663fe5268cc507ed6d452f65ea21aedc15f8a2518160d9c7d79472168c703a86b2c0d1469e21a16c9c066daf497d7790e7783d

    • SSDEEP

      24576:Y7kYHfY+I9kiD+GI1c7gb6Xa+7XnFmc0rCZfEuPhP+7:YRw7gben0rofDhu

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks