General

  • Target

    0edc09d74792f248a735c5ad853cc8be_JaffaCakes118

  • Size

    324KB

  • Sample

    240625-vlp54ascje

  • MD5

    0edc09d74792f248a735c5ad853cc8be

  • SHA1

    72dc003d73bdbdafecdda3648b27f16a2ee3780b

  • SHA256

    0e00774cfdb88bd50df3667850a4237ccb6a2ec249097f4c548632d135ba27bf

  • SHA512

    e51ae50b6ee8efbfa3aa2dfacc219c00a111144ee8faedefa1b25ea2b9c558d44c607b52c10a9db6e263ed7ba7ad70e378cb8b7242e8ffa4ef648d15c31fe3ce

  • SSDEEP

    6144:fcti3JWBIE69PhNrCe5gcsgSBpOuTXsnJ5k11vNv5FDutL64pdvFD:0c3Jg8Uc4pOuYcv5FutL7FFD

Malware Config

Targets

    • Target

      0edc09d74792f248a735c5ad853cc8be_JaffaCakes118

    • Size

      324KB

    • MD5

      0edc09d74792f248a735c5ad853cc8be

    • SHA1

      72dc003d73bdbdafecdda3648b27f16a2ee3780b

    • SHA256

      0e00774cfdb88bd50df3667850a4237ccb6a2ec249097f4c548632d135ba27bf

    • SHA512

      e51ae50b6ee8efbfa3aa2dfacc219c00a111144ee8faedefa1b25ea2b9c558d44c607b52c10a9db6e263ed7ba7ad70e378cb8b7242e8ffa4ef648d15c31fe3ce

    • SSDEEP

      6144:fcti3JWBIE69PhNrCe5gcsgSBpOuTXsnJ5k11vNv5FDutL64pdvFD:0c3Jg8Uc4pOuYcv5FutL7FFD

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks