General

  • Target

    38522de5bc566257e4a42690ee0f21b7_JaffaCakes118

  • Size

    293KB

  • Sample

    240711-jy9jqazbnh

  • MD5

    38522de5bc566257e4a42690ee0f21b7

  • SHA1

    78d060fbeb6cbc034e84610695cbd2f489788fe9

  • SHA256

    7ab35b5d4e088f5f49e7d9cfe1933fc4507cdaa63593f8a61d365d49bbe2c7aa

  • SHA512

    3471585e98a602e1347a2337bda0553ddf2fbe01e31ff6604f52e3fa71c136d9a5558b0e53c763731b8960c4d2cc59bc2841fedcb74674ef79b924326b4b5de1

  • SSDEEP

    6144:4Et7u+6qEgsrokm8hN+iCxslj1N/IxXByXCoJ49r3:Ft7u1v/N+lGN/MRoC

Malware Config

Targets

    • Target

      38522de5bc566257e4a42690ee0f21b7_JaffaCakes118

    • Size

      293KB

    • MD5

      38522de5bc566257e4a42690ee0f21b7

    • SHA1

      78d060fbeb6cbc034e84610695cbd2f489788fe9

    • SHA256

      7ab35b5d4e088f5f49e7d9cfe1933fc4507cdaa63593f8a61d365d49bbe2c7aa

    • SHA512

      3471585e98a602e1347a2337bda0553ddf2fbe01e31ff6604f52e3fa71c136d9a5558b0e53c763731b8960c4d2cc59bc2841fedcb74674ef79b924326b4b5de1

    • SSDEEP

      6144:4Et7u+6qEgsrokm8hN+iCxslj1N/IxXByXCoJ49r3:Ft7u1v/N+lGN/MRoC

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks