General

  • Target

    31092a371a630466d62b52c18f4e074e_JaffaCakes118

  • Size

    3.3MB

  • Sample

    240709-tgd2la1gjj

  • MD5

    31092a371a630466d62b52c18f4e074e

  • SHA1

    d2a2929c9e1860291bf912aaa2d88d5e15761c06

  • SHA256

    7d909295d274b959148f457d191b1fccd435716205863a68767fca4992475294

  • SHA512

    4543dff57f73fa022db61e385212be3002926bdce43d25f03396ea5250a572553f5695a3707e6dabb9a4d9c0dac9c3b68d351815ee7d5bfaa29805b69663a128

  • SSDEEP

    49152:DXPopeICUoUpYXN595m2nuwJ9/I4kmLlq6EPKwmhxMyfOsu49v4WGBkjPAQN7L5e:fmgP/

Malware Config

Targets

    • Target

      31092a371a630466d62b52c18f4e074e_JaffaCakes118

    • Size

      3.3MB

    • MD5

      31092a371a630466d62b52c18f4e074e

    • SHA1

      d2a2929c9e1860291bf912aaa2d88d5e15761c06

    • SHA256

      7d909295d274b959148f457d191b1fccd435716205863a68767fca4992475294

    • SHA512

      4543dff57f73fa022db61e385212be3002926bdce43d25f03396ea5250a572553f5695a3707e6dabb9a4d9c0dac9c3b68d351815ee7d5bfaa29805b69663a128

    • SSDEEP

      49152:DXPopeICUoUpYXN595m2nuwJ9/I4kmLlq6EPKwmhxMyfOsu49v4WGBkjPAQN7L5e:fmgP/

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks