General

  • Target

    5caa9ab24a9f71727407cf2b53fd50b3_JaffaCakes118

  • Size

    260KB

  • Sample

    240719-tmkfkasgjc

  • MD5

    5caa9ab24a9f71727407cf2b53fd50b3

  • SHA1

    b9a3c1210ca5dcb20a7dbb5d715dded43b03d354

  • SHA256

    0839ef2535c7ca36180a7c673ffc7b5551021e2de39fd26a8e2b1861cf706de9

  • SHA512

    6e6bc7ed995e3b1311b730c33e08429fb03d13b225b1f66d6345cb4e3094d9b19452b9e4536fcb053dc7ca46f2a279f1742f6362ff1705657bd826d205832856

  • SSDEEP

    6144:ajEDyVUtKq9o8BC2N6tdTTTbfxXuzJwGhrPN+:ZmVUtKq9o8BC2N6tdTTTbfxwmGhrF

Malware Config

Targets

    • Target

      5caa9ab24a9f71727407cf2b53fd50b3_JaffaCakes118

    • Size

      260KB

    • MD5

      5caa9ab24a9f71727407cf2b53fd50b3

    • SHA1

      b9a3c1210ca5dcb20a7dbb5d715dded43b03d354

    • SHA256

      0839ef2535c7ca36180a7c673ffc7b5551021e2de39fd26a8e2b1861cf706de9

    • SHA512

      6e6bc7ed995e3b1311b730c33e08429fb03d13b225b1f66d6345cb4e3094d9b19452b9e4536fcb053dc7ca46f2a279f1742f6362ff1705657bd826d205832856

    • SSDEEP

      6144:ajEDyVUtKq9o8BC2N6tdTTTbfxXuzJwGhrPN+:ZmVUtKq9o8BC2N6tdTTTbfxwmGhrF

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks