General

  • Target

    8a554c3209754f7f1401e66aecde8d63_JaffaCakes118

  • Size

    728KB

  • Sample

    240811-phmmxaygnj

  • MD5

    8a554c3209754f7f1401e66aecde8d63

  • SHA1

    d87e82ae3a15c87860b6f8ab148adbc67e507648

  • SHA256

    248eb03c79cb50d6fce9e8884135710f1bc9d72eccea9f1f9dde5d1c4bd740a6

  • SHA512

    9f6380bd0ab709eeaa9dd05291794e647890933cc18956709857536a7453cfd9dbd46eb8d0957cff4128075280f16abbb1c4bfa0a6ebb3aceac3c66b87b123f1

  • SSDEEP

    12288:+z9/32XvY6CD6zzXGytE0/OJKG+UlIKfJuUKo1nWjhStiSbUccDJIwsroma:u9vesuzzXGyO0/OJKiICuUKtYcwUccHt

Malware Config

Targets

    • Target

      8a554c3209754f7f1401e66aecde8d63_JaffaCakes118

    • Size

      728KB

    • MD5

      8a554c3209754f7f1401e66aecde8d63

    • SHA1

      d87e82ae3a15c87860b6f8ab148adbc67e507648

    • SHA256

      248eb03c79cb50d6fce9e8884135710f1bc9d72eccea9f1f9dde5d1c4bd740a6

    • SHA512

      9f6380bd0ab709eeaa9dd05291794e647890933cc18956709857536a7453cfd9dbd46eb8d0957cff4128075280f16abbb1c4bfa0a6ebb3aceac3c66b87b123f1

    • SSDEEP

      12288:+z9/32XvY6CD6zzXGytE0/OJKG+UlIKfJuUKo1nWjhStiSbUccDJIwsroma:u9vesuzzXGyO0/OJKiICuUKtYcwUccHt

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks