General

  • Target

    0462b21e734ef6deab97bfd879430755_JaffaCakes118

  • Size

    3.1MB

  • Sample

    240728-bemxlssamh

  • MD5

    0462b21e734ef6deab97bfd879430755

  • SHA1

    6bbeb4a5b59972379ae55142fb2ce29becef4ac4

  • SHA256

    e4446cd5f558f4d3589d9ba73145635e8ad06c0d4112ae240ee68dfe4c8182e6

  • SHA512

    f9af6e5301f15e01995113b9ccc943e0c452f8d89e58db3c5584b93d03a9766f4a2d2e74aef606d6a3cabd04cbd7d1bb09fce97f1c4157cfaf67495cd74bfa80

  • SSDEEP

    49152:ZUuBTOjZwS1Ihk+hy7iHuaRZnt+NTNLiG97q:ZXRO0hkr2Rxt+eb

Malware Config

Targets

    • Target

      0462b21e734ef6deab97bfd879430755_JaffaCakes118

    • Size

      3.1MB

    • MD5

      0462b21e734ef6deab97bfd879430755

    • SHA1

      6bbeb4a5b59972379ae55142fb2ce29becef4ac4

    • SHA256

      e4446cd5f558f4d3589d9ba73145635e8ad06c0d4112ae240ee68dfe4c8182e6

    • SHA512

      f9af6e5301f15e01995113b9ccc943e0c452f8d89e58db3c5584b93d03a9766f4a2d2e74aef606d6a3cabd04cbd7d1bb09fce97f1c4157cfaf67495cd74bfa80

    • SSDEEP

      49152:ZUuBTOjZwS1Ihk+hy7iHuaRZnt+NTNLiG97q:ZXRO0hkr2Rxt+eb

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks