General

  • Target

    8a1fb1ae2fb0206da6e284a8968682f4_JaffaCakes118

  • Size

    846KB

  • Sample

    240811-m7pgpa1djg

  • MD5

    8a1fb1ae2fb0206da6e284a8968682f4

  • SHA1

    c2335c9ad18720f5c83a952c2fe2652feafb4b36

  • SHA256

    637c7e5be0547b60f0753d104c18b1871149ee029d8135bf426a872f3bd34d27

  • SHA512

    be2d29a0e6ae1d3cf3a363bf072904743ea25fc49167f80352eae207b0f60484018ecd7463b2f827b74589ec55e4595e9479e39202e369158e225695db14d369

  • SSDEEP

    24576:o170q1SV9pZFcfx2jYBP08W2qfbjZfKga:iSVzzcfx2MP08Zqj1fM

Malware Config

Targets

    • Target

      8a1fb1ae2fb0206da6e284a8968682f4_JaffaCakes118

    • Size

      846KB

    • MD5

      8a1fb1ae2fb0206da6e284a8968682f4

    • SHA1

      c2335c9ad18720f5c83a952c2fe2652feafb4b36

    • SHA256

      637c7e5be0547b60f0753d104c18b1871149ee029d8135bf426a872f3bd34d27

    • SHA512

      be2d29a0e6ae1d3cf3a363bf072904743ea25fc49167f80352eae207b0f60484018ecd7463b2f827b74589ec55e4595e9479e39202e369158e225695db14d369

    • SSDEEP

      24576:o170q1SV9pZFcfx2jYBP08W2qfbjZfKga:iSVzzcfx2MP08Zqj1fM

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks