General

  • Target

    44a934d775dac381e1418d83167d1bf2_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240714-g39deasbld

  • MD5

    44a934d775dac381e1418d83167d1bf2

  • SHA1

    04050bc0b831fb2e43d0076b91b2df4fc74c79d4

  • SHA256

    0726f655f3bda9c72afbb69a83aa530a7c1c4d742e8cc898ddc921797662c50b

  • SHA512

    45cbcb2bb22b6640650360b60fa42b73be407f547aebeb67d0092d04a2ad5a406b3caa23c962fd6f7e84379b5021a71e7a1db0cc676f1f4c61a1f42bc8ef9034

  • SSDEEP

    24576:Q51YKSdeF1dATT8lAbwO8RR0GLuuP4kSKraLaRgYmJRsQLW9Eze:SLLNAT6YE5yuPpSKraLCBmJRHL36

Malware Config

Targets

    • Target

      44a934d775dac381e1418d83167d1bf2_JaffaCakes118

    • Size

      1.2MB

    • MD5

      44a934d775dac381e1418d83167d1bf2

    • SHA1

      04050bc0b831fb2e43d0076b91b2df4fc74c79d4

    • SHA256

      0726f655f3bda9c72afbb69a83aa530a7c1c4d742e8cc898ddc921797662c50b

    • SHA512

      45cbcb2bb22b6640650360b60fa42b73be407f547aebeb67d0092d04a2ad5a406b3caa23c962fd6f7e84379b5021a71e7a1db0cc676f1f4c61a1f42bc8ef9034

    • SSDEEP

      24576:Q51YKSdeF1dATT8lAbwO8RR0GLuuP4kSKraLaRgYmJRsQLW9Eze:SLLNAT6YE5yuPpSKraLCBmJRHL36

    Score
    7/10
    • Loads dropped DLL

    • Target

      $PLUGINSDIR/InstallOptions.dll

    • Size

      14KB

    • MD5

      325b008aec81e5aaa57096f05d4212b5

    • SHA1

      27a2d89747a20305b6518438eff5b9f57f7df5c3

    • SHA256

      c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    • SHA512

      18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

    • SSDEEP

      192:86d+dHXLHQOPiY53uiUdigyU+WsPdc/A1A+2jwK72dwF7dBEnbok:86UdHXcIiY535zBt2jw+BEnbo

    Score
    3/10
    • Target

      $PLUGINSDIR/MyBabylonTB.exe

    • Size

      898KB

    • MD5

      6bc41ba846a2e42c0aeee31a994f969a

    • SHA1

      ef414742749b388d4f6a3fd2bcf089125b23fa2c

    • SHA256

      a4b727bb1618decf1516f440974db01cef293272c096a81c5cf10f935bd847c7

    • SHA512

      07a7d1c09d69227561df28b2423c8fbef5430fc2064ac760e9dbfca55698da66a363ad79bd6e6399ecf48f95b3db19237e35bad65c9d5ccf6e67866dcc4efa2f

    • SSDEEP

      24576:5eYlVdeFg0QYKHlAkE182RJGLVuPdrS+7aheS:YiyrQYiBDnJuPFS+7aoS

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Target

      $PLUGINSDIR/NSISdl.dll

    • Size

      14KB

    • MD5

      a5f8399a743ab7f9c88c645c35b1ebb5

    • SHA1

      168f3c158913b0367bf79fa413357fbe97018191

    • SHA256

      dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    • SHA512

      824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

    • SSDEEP

      192:tUZTobBDJ68r67wmsvJI5ad9cXzFOVu+mZ/P3p+57CvpVqDxVp01Dwn2GRPgsfA:6Bo/680dCI5adOjFOg9//p27uNw2Go

    Score
    3/10
    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      c17103ae9072a06da581dec998343fc1

    • SHA1

      b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    • SHA256

      dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    • SHA512

      d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

    • SSDEEP

      192:7DKnJZCv6VmbJQC+tFiUdK7ckD4gRXKQx+LQ2CSF:7ViJrtFRdbmXK8+PCw

    Score
    3/10
    • Target

      $PLUGINSDIR/nsDialogs.dll

    • Size

      9KB

    • MD5

      c10e04dd4ad4277d5adc951bb331c777

    • SHA1

      b1e30808198a3ae6d6d1cca62df8893dc2a7ad43

    • SHA256

      e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a

    • SHA512

      853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e

    • SSDEEP

      96:hBABCcnl5TKhkfLxSslykcxM2DjDf3GE+Xv8Xav+Yx4VndY7ndS27gA:h6n+0SAfRE+/8ZYxMdqn420

    Score
    3/10
    • Target

      GinoPlayer.exe

    • Size

      222KB

    • MD5

      c17a42c91abde6ded943329568210b91

    • SHA1

      ab2e7babff3395c8820c13bd12a1ab543af5d5f1

    • SHA256

      adaa7f79345fd7a4e2feb24e78cb307b19cdb53d1ae6f5bb69e5e4070352082e

    • SHA512

      7aae0af7d21afd7d020bd302303b7fde2c1d07a3acd0d55cf30a3d211aaaf8d34853f2c55c054bebbfa7b2590a67d857701015cde340ae96cc32b2c2d78028be

    • SSDEEP

      3072:JX3hhg694tjSg694tdHoPRR4PKmxsFTiwQDsPeCQB1+PgQgqm3/VVg694t8:k5+PX4SDQzCQB1h6

    Score
    6/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Target

      Interop.WMPLib.dll

    • Size

      284KB

    • MD5

      d92527eaf9868a78a3153242d3b6098d

    • SHA1

      0a63e538fededd292e05364d62dfeab278eac413

    • SHA256

      5d36a9c572a309d3cc632ac8c7a1e4ea6fc3969b31dc6d1a9284dea44a213d80

    • SHA512

      27422787764863547331144a26fdb233f859a98c5fe15e1b1dcffa9c295da1535ca049e980e4a29d6068cd0fa54f947bfbda76e851c524a711611d6949d5a3ea

    • SSDEEP

      6144:UMfmxYbidUn+MCdW85I6hI3uFc7y5g/md0Dqx4HeVMriJQPWtkzaBoXOl8bSZAfl:UMfmxYbidUn+MCdW85I6hI3uFc7y5g/j

    Score
    1/10
    • Target

      launcher.exe

    • Size

      28KB

    • MD5

      57ee4bf53a3fc949e381b8a0f826f9c0

    • SHA1

      ebe9dea146ec22dc4f6e2bd19fe89762c976f129

    • SHA256

      9b42586c3f62d7a402ee834d9dd471a6a009dde9eaf7779aaacc73a29ba00a72

    • SHA512

      f1d884503dfbf288d6985f2bfb34002ec85f5ef90f0d23eed9e6e93f42f3f0bb7c7d4034d971f1c8470b7f6939a90e024a5e700d137aeebf5bc1a08244f3b652

    • SSDEEP

      384:V74kkwFjPPnnEK40S1KehwhDaDBWyhLH8G:1jkL1OqzGG

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.