General

  • Target

    672079749a8e34a61c8b5acc6f5a1fdd_JaffaCakes118

  • Size

    204KB

  • Sample

    240522-nrqkgsdb37

  • MD5

    672079749a8e34a61c8b5acc6f5a1fdd

  • SHA1

    95a099f927b9bfe80d9fae33b6843bdb70a67f7e

  • SHA256

    0acb7469a9437c06732ad3286ea3623817dbba9a919ee31d8f4b996b48d9abb3

  • SHA512

    902b6f6ac02a3d80955bf43e04e7487fe94659ace6bdd8cc7048b4f9c76afb76565c0c4b89d598e485604c17589b3dfb4ebf1f133dfc5ae4aaf7d1eedf344cfc

  • SSDEEP

    3072:OBQeq7dBjd90982lPcjJmc2Og2FphQHFBmmcDYNn/3riksQWtv9Y9:OBQeq7Dp9ArxqJmtOgVHFQonfFsQ

Malware Config

Targets

    • Target

      672079749a8e34a61c8b5acc6f5a1fdd_JaffaCakes118

    • Size

      204KB

    • MD5

      672079749a8e34a61c8b5acc6f5a1fdd

    • SHA1

      95a099f927b9bfe80d9fae33b6843bdb70a67f7e

    • SHA256

      0acb7469a9437c06732ad3286ea3623817dbba9a919ee31d8f4b996b48d9abb3

    • SHA512

      902b6f6ac02a3d80955bf43e04e7487fe94659ace6bdd8cc7048b4f9c76afb76565c0c4b89d598e485604c17589b3dfb4ebf1f133dfc5ae4aaf7d1eedf344cfc

    • SSDEEP

      3072:OBQeq7dBjd90982lPcjJmc2Og2FphQHFBmmcDYNn/3riksQWtv9Y9:OBQeq7Dp9ArxqJmtOgVHFQonfFsQ

    • UAC bypass

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks