General

  • Target

    75334ce0866ddb70caf9278c2f3d397e_JaffaCakes118

  • Size

    381KB

  • Sample

    240726-w11e2szclg

  • MD5

    75334ce0866ddb70caf9278c2f3d397e

  • SHA1

    eec6dc7554ea9764446f8cd2c8bc442b6cb5ae36

  • SHA256

    6f4ed2e3d13a670adc3ea4257d6b073d669f58b370c73048eb0c22cfa80f1373

  • SHA512

    0e53483490cdcd5c4f1e5cb92d180ffb99589cd17123944fb6a31baf0ead113e052e097272911e3594f8a76711d90119181f9a5ef6642b9c605f61c4b9304eb5

  • SSDEEP

    6144:A66E37LGbAgeCPOZ4+owxjA8KvUgEWmVbvEICan7v2Wh7twg5WDkMkiiXssLUjCu:T7LqXPbxAA8KvUgEWWbEYPtOgADccsGZ

Malware Config

Targets

    • Target

      75334ce0866ddb70caf9278c2f3d397e_JaffaCakes118

    • Size

      381KB

    • MD5

      75334ce0866ddb70caf9278c2f3d397e

    • SHA1

      eec6dc7554ea9764446f8cd2c8bc442b6cb5ae36

    • SHA256

      6f4ed2e3d13a670adc3ea4257d6b073d669f58b370c73048eb0c22cfa80f1373

    • SHA512

      0e53483490cdcd5c4f1e5cb92d180ffb99589cd17123944fb6a31baf0ead113e052e097272911e3594f8a76711d90119181f9a5ef6642b9c605f61c4b9304eb5

    • SSDEEP

      6144:A66E37LGbAgeCPOZ4+owxjA8KvUgEWmVbvEICan7v2Wh7twg5WDkMkiiXssLUjCu:T7LqXPbxAA8KvUgEWWbEYPtOgADccsGZ

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks