General

  • Target

    1ba1d511d6aadff604683e42dacc87de_JaffaCakes118

  • Size

    862KB

  • Sample

    240701-rqtgjawerc

  • MD5

    1ba1d511d6aadff604683e42dacc87de

  • SHA1

    0b1e1a5a1b925eaddb542dd4fc5da44e1c8fe23f

  • SHA256

    1535bdb6c0240fb35f3071d47ebc6423bcdd94c62f548bff78ec293830834535

  • SHA512

    fcea75c0c3eed2ab8660ed41726ece102f6b32ed6301970d31daaba3e439c75739da81c87303e1d5cf7b3720a2b76a0fb7466ac2eaa00dba98e0ca1ee8157b0e

  • SSDEEP

    24576:63HT0PGErMFsZLiF8cjfS7w6HJJHla2pZhR:yz0PGErMF2LAXfSvHJJFa2pZhR

Malware Config

Targets

    • Target

      1ba1d511d6aadff604683e42dacc87de_JaffaCakes118

    • Size

      862KB

    • MD5

      1ba1d511d6aadff604683e42dacc87de

    • SHA1

      0b1e1a5a1b925eaddb542dd4fc5da44e1c8fe23f

    • SHA256

      1535bdb6c0240fb35f3071d47ebc6423bcdd94c62f548bff78ec293830834535

    • SHA512

      fcea75c0c3eed2ab8660ed41726ece102f6b32ed6301970d31daaba3e439c75739da81c87303e1d5cf7b3720a2b76a0fb7466ac2eaa00dba98e0ca1ee8157b0e

    • SSDEEP

      24576:63HT0PGErMFsZLiF8cjfS7w6HJJHla2pZhR:yz0PGErMF2LAXfSvHJJFa2pZhR

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks