General

  • Target

    8edae2d23765e7ca032b1760ccf7964a_JaffaCakes118

  • Size

    512KB

  • Sample

    240602-v1jlvshe6s

  • MD5

    8edae2d23765e7ca032b1760ccf7964a

  • SHA1

    6a8479940b23e53582afcce6fceddb1cff2b9ee8

  • SHA256

    df2bb4bb293e41352e168390722c2583c2accb86c3a57cc390dff5ca9010fa56

  • SHA512

    40c1b64c8b772eacdc41202e28639bd226432c674c9173fe5dc5954ae7b5d340413c8b8eeb7f996686eb135b807f8beca599241793aae8c7ddd360c4f9d1576f

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6p:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5m

Malware Config

Targets

    • Target

      8edae2d23765e7ca032b1760ccf7964a_JaffaCakes118

    • Size

      512KB

    • MD5

      8edae2d23765e7ca032b1760ccf7964a

    • SHA1

      6a8479940b23e53582afcce6fceddb1cff2b9ee8

    • SHA256

      df2bb4bb293e41352e168390722c2583c2accb86c3a57cc390dff5ca9010fa56

    • SHA512

      40c1b64c8b772eacdc41202e28639bd226432c674c9173fe5dc5954ae7b5d340413c8b8eeb7f996686eb135b807f8beca599241793aae8c7ddd360c4f9d1576f

    • SSDEEP

      6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6p:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5m

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.