General

  • Target

    72593a603eaabb54cf4fde67ac168b88_JaffaCakes118

  • Size

    172KB

  • Sample

    240726-dhagsswajb

  • MD5

    72593a603eaabb54cf4fde67ac168b88

  • SHA1

    94792dea0ca2aeb8a619c80ebed2ffcb4dd8465f

  • SHA256

    ef6860d992093497d74c885b7c17e390c637df00346c2420d457500fd73e7b79

  • SHA512

    d7b9fa40ccbe834758b8a5176162ad538ac820aa0a09177d38a7770b196e34956d9cfa914ea27957c1fc25052c5b00436c2a64084e481868dcb1cc6955dab757

  • SSDEEP

    3072:bZSto+pGR5JICSEg82fXGr06p7TfS/PQ5YCjlhBYgIpYG21OlCE:aE8CSx82Oz7T93BhBYzpYzS

Malware Config

Targets

    • Target

      72593a603eaabb54cf4fde67ac168b88_JaffaCakes118

    • Size

      172KB

    • MD5

      72593a603eaabb54cf4fde67ac168b88

    • SHA1

      94792dea0ca2aeb8a619c80ebed2ffcb4dd8465f

    • SHA256

      ef6860d992093497d74c885b7c17e390c637df00346c2420d457500fd73e7b79

    • SHA512

      d7b9fa40ccbe834758b8a5176162ad538ac820aa0a09177d38a7770b196e34956d9cfa914ea27957c1fc25052c5b00436c2a64084e481868dcb1cc6955dab757

    • SSDEEP

      3072:bZSto+pGR5JICSEg82fXGr06p7TfS/PQ5YCjlhBYgIpYG21OlCE:aE8CSx82Oz7T93BhBYzpYzS

    • Modifies security service

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks