General

  • Target

    625ec69aabd2c7cdaad57c5d99fe448a_JaffaCakes118

  • Size

    5.5MB

  • Sample

    240722-jp48msxann

  • MD5

    625ec69aabd2c7cdaad57c5d99fe448a

  • SHA1

    21ed3e61751fed14f66664ee602256ae2990f5ed

  • SHA256

    2cac0a3c9513abf82654882e258c507865fd299b2215ebe57706047bcfa88ee8

  • SHA512

    65e704fe86b8aa63d05b6d30fbfcd1db7a03ec28c423cefd62742b0c1b339f60e4b5793d5e7b3c9d8eb907ffbff1bcac45d0df435fe7e5650073c580bbf5f3bf

  • SSDEEP

    49152:QkIW2QmzKALbdlGzlbiObpCdjN081PKkD7KdZ0d/oBbhu9y7LipnFYjL0j/dr4Zt:Z

Score
7/10

Malware Config

Targets

    • Target

      625ec69aabd2c7cdaad57c5d99fe448a_JaffaCakes118

    • Size

      5.5MB

    • MD5

      625ec69aabd2c7cdaad57c5d99fe448a

    • SHA1

      21ed3e61751fed14f66664ee602256ae2990f5ed

    • SHA256

      2cac0a3c9513abf82654882e258c507865fd299b2215ebe57706047bcfa88ee8

    • SHA512

      65e704fe86b8aa63d05b6d30fbfcd1db7a03ec28c423cefd62742b0c1b339f60e4b5793d5e7b3c9d8eb907ffbff1bcac45d0df435fe7e5650073c580bbf5f3bf

    • SSDEEP

      49152:QkIW2QmzKALbdlGzlbiObpCdjN081PKkD7KdZ0d/oBbhu9y7LipnFYjL0j/dr4Zt:Z

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks