General

  • Target

    8b89869ba6270326394662c7036458e9_JaffaCakes118

  • Size

    937KB

  • Sample

    240811-xc7pwswgqf

  • MD5

    8b89869ba6270326394662c7036458e9

  • SHA1

    eda0c06338942a5eff5a8acdea85ba56b25b12c9

  • SHA256

    414b5033f7b1ebd9d755ade27b697b20d2c45ce892eea9a1efe14fed890017cc

  • SHA512

    4243b8f22f44c3f07e144c6a39e1c5551e96b5b28f169b0ef2dbc62847de013075a1de2a8ee4f8104dc53fa889ab1ab5c7095e4b8addb5f26c94de5c12adfafd

  • SSDEEP

    24576:Au25Qp6vUVXFlLn5qFcaq/V67k1VMKNq:AuivvUV/n5qyvgg1XN

Malware Config

Targets

    • Target

      8b89869ba6270326394662c7036458e9_JaffaCakes118

    • Size

      937KB

    • MD5

      8b89869ba6270326394662c7036458e9

    • SHA1

      eda0c06338942a5eff5a8acdea85ba56b25b12c9

    • SHA256

      414b5033f7b1ebd9d755ade27b697b20d2c45ce892eea9a1efe14fed890017cc

    • SHA512

      4243b8f22f44c3f07e144c6a39e1c5551e96b5b28f169b0ef2dbc62847de013075a1de2a8ee4f8104dc53fa889ab1ab5c7095e4b8addb5f26c94de5c12adfafd

    • SSDEEP

      24576:Au25Qp6vUVXFlLn5qFcaq/V67k1VMKNq:AuivvUV/n5qyvgg1XN

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks