General

  • Target

    21d4dca4947d39b1b5e3f0c88e8f0181_JaffaCakes118

  • Size

    83KB

  • Sample

    240703-k87njszenl

  • MD5

    21d4dca4947d39b1b5e3f0c88e8f0181

  • SHA1

    268a35df737390029fa7ccde5a1f92ba2cef5724

  • SHA256

    1ee8cd04528e655ef1e1ca0494fac121321ecd0993d76c5f678fbbcef661125c

  • SHA512

    01ebc64f8201f8335246d824f5b2cc03a9ef5976361eeb6309bd4235d74153ea1f46a20c06fdc20b6b536eff7f4ffbf75b513291804222df88b76f53f485cdbb

  • SSDEEP

    1536:FTViOcRUBWC2jZP2ITQX5+e7ZnbHJFT12EJ4AZD6nm3ZjayurLR:FTUOPWC/IUJtZnbHJuc4w6m3ZjayILR

Malware Config

Targets

    • Target

      21d4dca4947d39b1b5e3f0c88e8f0181_JaffaCakes118

    • Size

      83KB

    • MD5

      21d4dca4947d39b1b5e3f0c88e8f0181

    • SHA1

      268a35df737390029fa7ccde5a1f92ba2cef5724

    • SHA256

      1ee8cd04528e655ef1e1ca0494fac121321ecd0993d76c5f678fbbcef661125c

    • SHA512

      01ebc64f8201f8335246d824f5b2cc03a9ef5976361eeb6309bd4235d74153ea1f46a20c06fdc20b6b536eff7f4ffbf75b513291804222df88b76f53f485cdbb

    • SSDEEP

      1536:FTViOcRUBWC2jZP2ITQX5+e7ZnbHJFT12EJ4AZD6nm3ZjayurLR:FTUOPWC/IUJtZnbHJuc4w6m3ZjayILR

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks