General

  • Target

    41130eee8c9b0240b72c405c525c0146_JaffaCakes118

  • Size

    840KB

  • Sample

    240713-k8fj3aveln

  • MD5

    41130eee8c9b0240b72c405c525c0146

  • SHA1

    4ae3d99db6a1175bb70146670c85afeeaa10ed51

  • SHA256

    800d2b7f9b7badf7c6d0761756d6f1bf35c7bf91308ea23b8820998112eaa840

  • SHA512

    05aa1e5201bd5f604bb76abab69054835bc8fc3c52e4f579243a5fc04203c9421e2c593ebc60850b8d9b242901483ca1f6f4ab59574e0d7b48c4d50f53c32ae3

  • SSDEEP

    12288:zCpyvXFPTfnCvX66h/NYJ9nDW6FApNg3gZqdDUtOuBiMc/j6KRVrxn7Nl4+GtlrL:mk9P7nCvX6MNYLIbgYJ3chra+GbrL

Malware Config

Targets

    • Target

      41130eee8c9b0240b72c405c525c0146_JaffaCakes118

    • Size

      840KB

    • MD5

      41130eee8c9b0240b72c405c525c0146

    • SHA1

      4ae3d99db6a1175bb70146670c85afeeaa10ed51

    • SHA256

      800d2b7f9b7badf7c6d0761756d6f1bf35c7bf91308ea23b8820998112eaa840

    • SHA512

      05aa1e5201bd5f604bb76abab69054835bc8fc3c52e4f579243a5fc04203c9421e2c593ebc60850b8d9b242901483ca1f6f4ab59574e0d7b48c4d50f53c32ae3

    • SSDEEP

      12288:zCpyvXFPTfnCvX66h/NYJ9nDW6FApNg3gZqdDUtOuBiMc/j6KRVrxn7Nl4+GtlrL:mk9P7nCvX6MNYLIbgYJ3chra+GbrL

    • Modifies visiblity of hidden/system files in Explorer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks