General

  • Target

    3e1b475608a0f58b4f611025edbcb99b_JaffaCakes118

  • Size

    5.4MB

  • Sample

    240712-t797qa1gqm

  • MD5

    3e1b475608a0f58b4f611025edbcb99b

  • SHA1

    987e3e93bd65b4e17d341fe2c7986fa596249b33

  • SHA256

    ef5a4eb40733a378ba1dbfdeeecbcd0ba776d1fe7c293a703ee1431cc2a5f248

  • SHA512

    67acaf217150b3a073018c83614c61e8c9b2d58ce4ab849b3973d1eb024d9227aa8200caa9348b3313b3d43ea5c66bdd5e582d0b2e24fa64b672afe7361025c3

  • SSDEEP

    49152:OQJ3vdwlU0AP5kdYTDuvFFrj1qWsWG9Adva5yheSWYJ0q:74U0AP5GYTMFFrc0va5yheSWYJ0q

Malware Config

Targets

    • Target

      3e1b475608a0f58b4f611025edbcb99b_JaffaCakes118

    • Size

      5.4MB

    • MD5

      3e1b475608a0f58b4f611025edbcb99b

    • SHA1

      987e3e93bd65b4e17d341fe2c7986fa596249b33

    • SHA256

      ef5a4eb40733a378ba1dbfdeeecbcd0ba776d1fe7c293a703ee1431cc2a5f248

    • SHA512

      67acaf217150b3a073018c83614c61e8c9b2d58ce4ab849b3973d1eb024d9227aa8200caa9348b3313b3d43ea5c66bdd5e582d0b2e24fa64b672afe7361025c3

    • SSDEEP

      49152:OQJ3vdwlU0AP5kdYTDuvFFrj1qWsWG9Adva5yheSWYJ0q:74U0AP5GYTMFFrc0va5yheSWYJ0q

    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.