General

  • Target

    640e0e534240cbbdfd9ae14981197fd1_JaffaCakes118

  • Size

    864KB

  • Sample

    240722-vqvalsxhlf

  • MD5

    640e0e534240cbbdfd9ae14981197fd1

  • SHA1

    46daf804c2e4b26650d515bdd4e6bee59a4620fe

  • SHA256

    3b439c4202d21865984e8a3daa8180c328bb5b9112815eaf2e283e6fa545755f

  • SHA512

    ce1cc86079188c6bd98a977a8287ccae873be8cc45ef1a6d2489805e5d027a88bd1eb17301736fc2a4d037d0143e948537569e5f89a9944220d896a40090c7ea

  • SSDEEP

    24576:g5bNPnaJscCkGFHrXysr6hZalNcPM9ccbVg3Aa/oTZ:g5bpgsTFXysJu3pgTZ

Malware Config

Targets

    • Target

      640e0e534240cbbdfd9ae14981197fd1_JaffaCakes118

    • Size

      864KB

    • MD5

      640e0e534240cbbdfd9ae14981197fd1

    • SHA1

      46daf804c2e4b26650d515bdd4e6bee59a4620fe

    • SHA256

      3b439c4202d21865984e8a3daa8180c328bb5b9112815eaf2e283e6fa545755f

    • SHA512

      ce1cc86079188c6bd98a977a8287ccae873be8cc45ef1a6d2489805e5d027a88bd1eb17301736fc2a4d037d0143e948537569e5f89a9944220d896a40090c7ea

    • SSDEEP

      24576:g5bNPnaJscCkGFHrXysr6hZalNcPM9ccbVg3Aa/oTZ:g5bpgsTFXysJu3pgTZ

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks