General

  • Target

    4e7ded60476852a7fe326ca45dbd9fc1_JaffaCakes118

  • Size

    208KB

  • Sample

    240716-ql5tbsxdjh

  • MD5

    4e7ded60476852a7fe326ca45dbd9fc1

  • SHA1

    e44896ce78e783007ead7f90ad83330e711a9564

  • SHA256

    bcaee0755e508978e5573fb7d3cb2be303853a8e3789f8afc884ae1b4a51834f

  • SHA512

    780c048c3dd5b5c25b094a643a4e4d32fe970f256167a74b3be6201bc5a2ef983fa24dc3a151c6c14f390cf89399bb5fa091b560fb7610a0d5537d4eba5c88f5

  • SSDEEP

    6144:O3bdXPx3adIKCC0ef//uXltKc+LVsz9b8:YadFeCXuLKcCVsz6

Malware Config

Targets

    • Target

      4e7ded60476852a7fe326ca45dbd9fc1_JaffaCakes118

    • Size

      208KB

    • MD5

      4e7ded60476852a7fe326ca45dbd9fc1

    • SHA1

      e44896ce78e783007ead7f90ad83330e711a9564

    • SHA256

      bcaee0755e508978e5573fb7d3cb2be303853a8e3789f8afc884ae1b4a51834f

    • SHA512

      780c048c3dd5b5c25b094a643a4e4d32fe970f256167a74b3be6201bc5a2ef983fa24dc3a151c6c14f390cf89399bb5fa091b560fb7610a0d5537d4eba5c88f5

    • SSDEEP

      6144:O3bdXPx3adIKCC0ef//uXltKc+LVsz9b8:YadFeCXuLKcCVsz6

    Score
    7/10
    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks