General

  • Target

    7abe6d48f4ec539abb56ea0c8532beac_JaffaCakes118

  • Size

    525KB

  • Sample

    240527-2ayresdc54

  • MD5

    7abe6d48f4ec539abb56ea0c8532beac

  • SHA1

    037af467ca2d66276880c01be5f43b7e60eb3a0d

  • SHA256

    cc94b2d179c5d7817b97287c64a045884f02ddf00844c9e862e93c4e9e2c6d2d

  • SHA512

    4113eb210c2379eb8a0b08cc57ecd6e0d905ed915c5410d8c14225c8130a8c7e005bbeb7cf699dde794fd35ff68e342b12522d56070689772cf21800db324e26

  • SSDEEP

    12288:QwG0kVzqqPIvLAVPNEeaD8gbaRmMiJGEhmtb1:FlyzqqAXXD8gi2JLC

Malware Config

Targets

    • Target

      7abe6d48f4ec539abb56ea0c8532beac_JaffaCakes118

    • Size

      525KB

    • MD5

      7abe6d48f4ec539abb56ea0c8532beac

    • SHA1

      037af467ca2d66276880c01be5f43b7e60eb3a0d

    • SHA256

      cc94b2d179c5d7817b97287c64a045884f02ddf00844c9e862e93c4e9e2c6d2d

    • SHA512

      4113eb210c2379eb8a0b08cc57ecd6e0d905ed915c5410d8c14225c8130a8c7e005bbeb7cf699dde794fd35ff68e342b12522d56070689772cf21800db324e26

    • SSDEEP

      12288:QwG0kVzqqPIvLAVPNEeaD8gbaRmMiJGEhmtb1:FlyzqqAXXD8gi2JLC

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks