General

  • Target

    4caf961473fc6bc6a7e4b0e4896202f6_JaffaCakes118

  • Size

    280KB

  • Sample

    240516-x39xyacd2s

  • MD5

    4caf961473fc6bc6a7e4b0e4896202f6

  • SHA1

    18fa6facb599588cb25a3ee414e8719b9629d55a

  • SHA256

    86f6533803e9fcca5ff60a6e136bc71114384d6e618f6ae080ac446d6756116c

  • SHA512

    09162c29451761590ce2426d17670d0a8d1771388fbb3fca44ba82c8de16d2df9623ad84c3576713d90f5d43b1a8b8390326faac0e0d2d8351512ce176f9401d

  • SSDEEP

    6144:iXzRxgkd1V3jcWWQv3cXlrByg3dgWysDKoQtLtz8:iDRSC7zcWvulE4fDLQttz

Malware Config

Targets

    • Target

      4caf961473fc6bc6a7e4b0e4896202f6_JaffaCakes118

    • Size

      280KB

    • MD5

      4caf961473fc6bc6a7e4b0e4896202f6

    • SHA1

      18fa6facb599588cb25a3ee414e8719b9629d55a

    • SHA256

      86f6533803e9fcca5ff60a6e136bc71114384d6e618f6ae080ac446d6756116c

    • SHA512

      09162c29451761590ce2426d17670d0a8d1771388fbb3fca44ba82c8de16d2df9623ad84c3576713d90f5d43b1a8b8390326faac0e0d2d8351512ce176f9401d

    • SSDEEP

      6144:iXzRxgkd1V3jcWWQv3cXlrByg3dgWysDKoQtLtz8:iDRSC7zcWvulE4fDLQttz

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks