General

  • Target

    18a15ee4a5bf899e48ef481d8f48437b_JaffaCakes118

  • Size

    984KB

  • Sample

    240628-d3936ayglb

  • MD5

    18a15ee4a5bf899e48ef481d8f48437b

  • SHA1

    9f64797d2393edf76fcb9c07d7c2d4a6e54bd422

  • SHA256

    de4dff738072a634b37b86d5ecd4409f00974cd64498288f85cb1fffe15ca2ee

  • SHA512

    ec9ec1a9759529e1a57d000ffb47e3715649835b863e63e6fc85b0d4d759494888ee71ebb625fe7c41144bbd005adfb79fb9913ce040194d05f930aebe5dc476

  • SSDEEP

    12288:gLCS+qQ6Le8SP7J4pL4ij3MqdmZTWzwLqPj3MqdmZTWzwLqCoKJW:4Qn3mLvL2TjLqrL2TjLqM

Score
7/10

Malware Config

Targets

    • Target

      18a15ee4a5bf899e48ef481d8f48437b_JaffaCakes118

    • Size

      984KB

    • MD5

      18a15ee4a5bf899e48ef481d8f48437b

    • SHA1

      9f64797d2393edf76fcb9c07d7c2d4a6e54bd422

    • SHA256

      de4dff738072a634b37b86d5ecd4409f00974cd64498288f85cb1fffe15ca2ee

    • SHA512

      ec9ec1a9759529e1a57d000ffb47e3715649835b863e63e6fc85b0d4d759494888ee71ebb625fe7c41144bbd005adfb79fb9913ce040194d05f930aebe5dc476

    • SSDEEP

      12288:gLCS+qQ6Le8SP7J4pL4ij3MqdmZTWzwLqPj3MqdmZTWzwLqCoKJW:4Qn3mLvL2TjLqrL2TjLqM

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks