General

  • Target

    317f13ba903480cff2ec103d1b20f479_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240709-w6ny7sycjp

  • MD5

    317f13ba903480cff2ec103d1b20f479

  • SHA1

    f04fd3b168fe01e94086725a352ff478c8da3f75

  • SHA256

    698869979dc72c4eb59964b9fac3900a1d6f34e0f4016c4f777dbbe457ac20e8

  • SHA512

    7104a5c128eeda5ca9ef477b9bdeb699de124e0c9e428b13ecd8440faf43e1d101543b6fe57bb62f6123ba3e227accd36dfb87b04a4e2a0973f8948f59ee9a5b

  • SSDEEP

    24576:iREWpQ5FGtzNFY9+YB6k4tZcakStc7yJbm8Lu/5VTzv:iR0atzDY9+LteWc7ylS/T/v

Malware Config

Targets

    • Target

      317f13ba903480cff2ec103d1b20f479_JaffaCakes118

    • Size

      1.1MB

    • MD5

      317f13ba903480cff2ec103d1b20f479

    • SHA1

      f04fd3b168fe01e94086725a352ff478c8da3f75

    • SHA256

      698869979dc72c4eb59964b9fac3900a1d6f34e0f4016c4f777dbbe457ac20e8

    • SHA512

      7104a5c128eeda5ca9ef477b9bdeb699de124e0c9e428b13ecd8440faf43e1d101543b6fe57bb62f6123ba3e227accd36dfb87b04a4e2a0973f8948f59ee9a5b

    • SSDEEP

      24576:iREWpQ5FGtzNFY9+YB6k4tZcakStc7yJbm8Lu/5VTzv:iR0atzDY9+LteWc7ylS/T/v

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks