General

  • Target

    2a200d16a9caea58ca8791b7439f3390_JaffaCakes118

  • Size

    264KB

  • Sample

    240707-27yspatbka

  • MD5

    2a200d16a9caea58ca8791b7439f3390

  • SHA1

    cae913ffeed956236e48ef9de03d5ffb1e8efb0a

  • SHA256

    1ee7ab2d042917248f74aed63611e1956040b1ae8f088ad7fd96e848c971d51c

  • SHA512

    fbe021d9f4b7f2a34dcd64a12320c9fe6fcbf1b840f4e1d0488a3014b2b6317315a21a6556a06dc74f477fccb0ad0523e6df3dd9b0357ab6de95785e5dc1821c

  • SSDEEP

    6144:pnbcQXNpJus4gtjLLvQCKdftMNIV1VVfv6t:RdtjLLvktMs1VVE

Malware Config

Targets

    • Target

      2a200d16a9caea58ca8791b7439f3390_JaffaCakes118

    • Size

      264KB

    • MD5

      2a200d16a9caea58ca8791b7439f3390

    • SHA1

      cae913ffeed956236e48ef9de03d5ffb1e8efb0a

    • SHA256

      1ee7ab2d042917248f74aed63611e1956040b1ae8f088ad7fd96e848c971d51c

    • SHA512

      fbe021d9f4b7f2a34dcd64a12320c9fe6fcbf1b840f4e1d0488a3014b2b6317315a21a6556a06dc74f477fccb0ad0523e6df3dd9b0357ab6de95785e5dc1821c

    • SSDEEP

      6144:pnbcQXNpJus4gtjLLvQCKdftMNIV1VVfv6t:RdtjLLvktMs1VVE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks