General

  • Target

    45be5529779a122dc4b643b1833b183f_JaffaCakes118

  • Size

    28KB

  • Sample

    240714-n946lasbnh

  • MD5

    45be5529779a122dc4b643b1833b183f

  • SHA1

    99a7b71dba254f71321924cbf55eb732f2c6256b

  • SHA256

    9625d5085bf6f87c71a5366a01010e6e2d6f276012877ff3c6501b3e7578f733

  • SHA512

    13521c218d62f702de36ebc63cea0096c38c3e4933f92fbc540e068d1a86d75a2b311c5e9f578146ea5641e3737b595b5697d345a511b0f022ec12a2b5ccc320

  • SSDEEP

    192:/TGOaxmBuI4ig9d+m1pivuIKCWMjda2YX1bIRt+5Xiyp9Stq0T0qAt:/TmIoimdD1pcFKGjA2oVgS19SU0Q

Score
8/10

Malware Config

Targets

    • Target

      45be5529779a122dc4b643b1833b183f_JaffaCakes118

    • Size

      28KB

    • MD5

      45be5529779a122dc4b643b1833b183f

    • SHA1

      99a7b71dba254f71321924cbf55eb732f2c6256b

    • SHA256

      9625d5085bf6f87c71a5366a01010e6e2d6f276012877ff3c6501b3e7578f733

    • SHA512

      13521c218d62f702de36ebc63cea0096c38c3e4933f92fbc540e068d1a86d75a2b311c5e9f578146ea5641e3737b595b5697d345a511b0f022ec12a2b5ccc320

    • SSDEEP

      192:/TGOaxmBuI4ig9d+m1pivuIKCWMjda2YX1bIRt+5Xiyp9Stq0T0qAt:/TmIoimdD1pcFKGjA2oVgS19SU0Q

    Score
    8/10
    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks