General

  • Target

    51d874a199d06016d3908689e285a013_JaffaCakes118

  • Size

    106KB

  • Sample

    240517-2l7hpseh98

  • MD5

    51d874a199d06016d3908689e285a013

  • SHA1

    0d431532826ff0cb7df6b8f143184cbdb5790ba6

  • SHA256

    2a4366648784112d6edd66fb4a2d364c6cb2d896eebf893c73d72d944b75b3e3

  • SHA512

    4e15fbd01a628caa735b7def79d08bad3c162e0ccb6340e0fdefc3d8c41cc810508276402ee055b259c911f6c5525cb28d6f42d0bfdb7bff4bf5125dc9369810

  • SSDEEP

    3072:b5mElKKBi6/Rl8DvCuItDo2KIgx0hWsEsjOhflqfxXz24Hw:bYqB7/Rl8pYD0Igx0hNPjBhw

Malware Config

Targets

    • Target

      injector.exe

    • Size

      256KB

    • MD5

      e60ac3bfccae47b4cf56e9a87b8d3455

    • SHA1

      8a5b754f45ca12aa925f76c44326ad12a6377a3e

    • SHA256

      39be215880a86a7b308b076c174d947a735e757c0b14b598329ec530344180b6

    • SHA512

      467a4062a6a87770bc03cace5bf4c3fc099d6a59bf098e0c675091a7cd052c52eb0ea411c1bd3f72130397a65c432997c8cff8c18370dd1db80bb8d85731db80

    • SSDEEP

      3072:sr85CUmcV1M6MofIFjPU7d9eoZnJq4GMFNXNAvM3FcUrbVmxi9AogJoTRhbbcgVR:k9GX04uUnoAnfcgVkjguXFVnhe6Ta

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks