General

  • Target

    8a80f0c234c059839b875917ab4f96dd_JaffaCakes118

  • Size

    400KB

  • Sample

    240811-qj1rla1djj

  • MD5

    8a80f0c234c059839b875917ab4f96dd

  • SHA1

    30beae17c3835047e9afc01a869188ce02f7f1d6

  • SHA256

    174292def9996459f78ace8305afc9d594f9b48aea868242e43b050ff521bbdb

  • SHA512

    c805082f3c56a832333bf9a06e548beba35daa5c2b406fcba605487620d626665394dfc7f960b1f6d223d19b6cb3ca65b16247379f3d6344aeb8c0b8e8797776

  • SSDEEP

    3072:78hrAZFJoSQAC1zS66IPXKr6vgaZwgwjP6S1:sjWr6BZvUP6W

Malware Config

Targets

    • Target

      8a80f0c234c059839b875917ab4f96dd_JaffaCakes118

    • Size

      400KB

    • MD5

      8a80f0c234c059839b875917ab4f96dd

    • SHA1

      30beae17c3835047e9afc01a869188ce02f7f1d6

    • SHA256

      174292def9996459f78ace8305afc9d594f9b48aea868242e43b050ff521bbdb

    • SHA512

      c805082f3c56a832333bf9a06e548beba35daa5c2b406fcba605487620d626665394dfc7f960b1f6d223d19b6cb3ca65b16247379f3d6344aeb8c0b8e8797776

    • SSDEEP

      3072:78hrAZFJoSQAC1zS66IPXKr6vgaZwgwjP6S1:sjWr6BZvUP6W

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks