General

  • Target

    4a86710bffbfa7b9900b6dc116c09280_JaffaCakes118

  • Size

    65KB

  • Sample

    240715-t7wpbssfkg

  • MD5

    4a86710bffbfa7b9900b6dc116c09280

  • SHA1

    5aa01871b9515b47a6d844fad5627ee3d7f865d2

  • SHA256

    d1ceed5783402d86fc9e238b39d4724a943e6c17166caf6ed2434940962160cb

  • SHA512

    d9bf3c3bd5b55f3ef7bcc5d45a7a92e0364e142a0c285a9d0081002650ef8c0c9e8a91e947a762c271d7fea0c27f37c7076fad77c73bdf78b7b1d5068963e77f

  • SSDEEP

    1536:elmWlyiXiwIVUv6vXXxyit5HQPnjnR3jOLdyFAS/R:8WXxyitRUJG0AS/R

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    0134847853

Targets

    • Target

      4a86710bffbfa7b9900b6dc116c09280_JaffaCakes118

    • Size

      65KB

    • MD5

      4a86710bffbfa7b9900b6dc116c09280

    • SHA1

      5aa01871b9515b47a6d844fad5627ee3d7f865d2

    • SHA256

      d1ceed5783402d86fc9e238b39d4724a943e6c17166caf6ed2434940962160cb

    • SHA512

      d9bf3c3bd5b55f3ef7bcc5d45a7a92e0364e142a0c285a9d0081002650ef8c0c9e8a91e947a762c271d7fea0c27f37c7076fad77c73bdf78b7b1d5068963e77f

    • SSDEEP

      1536:elmWlyiXiwIVUv6vXXxyit5HQPnjnR3jOLdyFAS/R:8WXxyitRUJG0AS/R

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks