General

  • Target

    6538ffdc4979ddd17300b40c74256224_JaffaCakes118

  • Size

    103KB

  • Sample

    240722-3dznkatgpg

  • MD5

    6538ffdc4979ddd17300b40c74256224

  • SHA1

    9c3d833caf3c8c05c714d3a40e51b34d65c7066c

  • SHA256

    f8e6f72636ae5a24f6bfd3b5550730c44c3018693d1165515002b54646748fae

  • SHA512

    9e2dd09711890987f76a9a059d67e1d78fc0fe7adc17270ed9cc6607430777871cc83cd65f59c5a1aae0b173d7d03c3db11b4e09e5a93003135f7abe8114dc40

  • SSDEEP

    1536:1SPj2qkSZZZ3gddsxj3XnszbhZeoB7IYIWkZHnjYzkH5axw/o5kXTM:1SPjYUHHnsz1H556cI5Uw/o5UM

Malware Config

Targets

    • Target

      6538ffdc4979ddd17300b40c74256224_JaffaCakes118

    • Size

      103KB

    • MD5

      6538ffdc4979ddd17300b40c74256224

    • SHA1

      9c3d833caf3c8c05c714d3a40e51b34d65c7066c

    • SHA256

      f8e6f72636ae5a24f6bfd3b5550730c44c3018693d1165515002b54646748fae

    • SHA512

      9e2dd09711890987f76a9a059d67e1d78fc0fe7adc17270ed9cc6607430777871cc83cd65f59c5a1aae0b173d7d03c3db11b4e09e5a93003135f7abe8114dc40

    • SSDEEP

      1536:1SPj2qkSZZZ3gddsxj3XnszbhZeoB7IYIWkZHnjYzkH5axw/o5kXTM:1SPjYUHHnsz1H556cI5Uw/o5UM

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks