General

  • Target

    19aa09f75b49899cc38db71a5fda941b_JaffaCakes118

  • Size

    204KB

  • Sample

    240628-lpbbnsvhpr

  • MD5

    19aa09f75b49899cc38db71a5fda941b

  • SHA1

    094ed1c8001dbedd576f07e58f81eabd9c6f8bc9

  • SHA256

    d734f11b95365b25f5381a85aea3df11a420865d5245e56136ee2d252aeb3e5e

  • SHA512

    2e93c3b5c4efcbd9dc96fb7d56a2ca046f425086d3c265336e8170c0a5208e3bea558d6b5993f93fd4b62b84fe1629e088b2123b02522ad19dbfa92bd68bd8dc

  • SSDEEP

    3072:T2+RDecvxm9T44toxKaJ0lKKDvbzo/nCYczSY2RhfSbwes4YfM:T2+Ryc5QT44nc0h7b8/pc+zRhq8e

Malware Config

Targets

    • Target

      19aa09f75b49899cc38db71a5fda941b_JaffaCakes118

    • Size

      204KB

    • MD5

      19aa09f75b49899cc38db71a5fda941b

    • SHA1

      094ed1c8001dbedd576f07e58f81eabd9c6f8bc9

    • SHA256

      d734f11b95365b25f5381a85aea3df11a420865d5245e56136ee2d252aeb3e5e

    • SHA512

      2e93c3b5c4efcbd9dc96fb7d56a2ca046f425086d3c265336e8170c0a5208e3bea558d6b5993f93fd4b62b84fe1629e088b2123b02522ad19dbfa92bd68bd8dc

    • SSDEEP

      3072:T2+RDecvxm9T44toxKaJ0lKKDvbzo/nCYczSY2RhfSbwes4YfM:T2+Ryc5QT44nc0h7b8/pc+zRhq8e

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks