General

  • Target

    419b5cc522736b762c580d6fc132888b_JaffaCakes118

  • Size

    568KB

  • Sample

    240713-pc9kgsscpf

  • MD5

    419b5cc522736b762c580d6fc132888b

  • SHA1

    e038d6143dac6ec2332fb9367e6eeb79146f24dd

  • SHA256

    52817feb081571cf7181508f923799d62d3ca58a58b184a4534dd48654564889

  • SHA512

    8e09fe69bc6315c4af05c1e1ca5ec00338243470e52d4a4779b73f93125eb42c38405154b4bdcf9d75e99fe81b5f504ed4cb448c2876e369ee98cc6f8bda2691

  • SSDEEP

    12288:O4iLwBRU4Kue47ylrAbewyyXSRK8jE/rRYDju:O4iLYUfuileewyyB8AjRYDju

Score
7/10

Malware Config

Targets

    • Target

      419b5cc522736b762c580d6fc132888b_JaffaCakes118

    • Size

      568KB

    • MD5

      419b5cc522736b762c580d6fc132888b

    • SHA1

      e038d6143dac6ec2332fb9367e6eeb79146f24dd

    • SHA256

      52817feb081571cf7181508f923799d62d3ca58a58b184a4534dd48654564889

    • SHA512

      8e09fe69bc6315c4af05c1e1ca5ec00338243470e52d4a4779b73f93125eb42c38405154b4bdcf9d75e99fe81b5f504ed4cb448c2876e369ee98cc6f8bda2691

    • SSDEEP

      12288:O4iLwBRU4Kue47ylrAbewyyXSRK8jE/rRYDju:O4iLYUfuileewyyB8AjRYDju

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks