General

  • Target

    b7e49368d6a41595b15d2fdd243f340a_JaffaCakes118

  • Size

    170KB

  • Sample

    240617-lfazjsvcjb

  • MD5

    b7e49368d6a41595b15d2fdd243f340a

  • SHA1

    bc8fe33e90071dc4ef36cee9e343f83bf53a79c0

  • SHA256

    2d62a05252267644342eb53d955c1828fa467ea857869cbedea8b737a570a896

  • SHA512

    989207e797f975c05a021b2ef09db62512a5f1728ef917d0b97f5f421572ce5f51ecc30ba1c3ca98c7adca692fa478fd68142558e64d63744c2defd3e887e95e

  • SSDEEP

    3072:+5ERKdsNSE8jWf+FnGevgjFA+WzmLpJhJ4RpS:+wB8qonGeoFA0lyp

Malware Config

Targets

    • Target

      b7e49368d6a41595b15d2fdd243f340a_JaffaCakes118

    • Size

      170KB

    • MD5

      b7e49368d6a41595b15d2fdd243f340a

    • SHA1

      bc8fe33e90071dc4ef36cee9e343f83bf53a79c0

    • SHA256

      2d62a05252267644342eb53d955c1828fa467ea857869cbedea8b737a570a896

    • SHA512

      989207e797f975c05a021b2ef09db62512a5f1728ef917d0b97f5f421572ce5f51ecc30ba1c3ca98c7adca692fa478fd68142558e64d63744c2defd3e887e95e

    • SSDEEP

      3072:+5ERKdsNSE8jWf+FnGevgjFA+WzmLpJhJ4RpS:+wB8qonGeoFA0lyp

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks