General

  • Target

    a29ff8a48397bb70019d4620b1025b48_JaffaCakes118

  • Size

    59KB

  • Sample

    240817-p8gjkswgqg

  • MD5

    a29ff8a48397bb70019d4620b1025b48

  • SHA1

    cae92c2c8d9a679c077727cc0bb9cce27190b9ee

  • SHA256

    62aaaff7edc15d74aec75d1ba76e1d0bd98a67135da984b8eb018736e31c3004

  • SHA512

    0a1072c8a217a3ab908f751b04c76abc6664b38ae1795bd44bae4aa7f4fddd05ea4dbdec5cc247ab699742da88b0be3ab671a566520db384caa804e0a77c02b3

  • SSDEEP

    768:XocAX3LKew369lp2z3Sd4baFXLjwP/Tgj93b8NIocVSEFnocAX3LKew369lp2z3+:SKcR4mjD9r823FCKcR4mjD9r823Fz

Malware Config

Targets

    • Target

      a29ff8a48397bb70019d4620b1025b48_JaffaCakes118

    • Size

      59KB

    • MD5

      a29ff8a48397bb70019d4620b1025b48

    • SHA1

      cae92c2c8d9a679c077727cc0bb9cce27190b9ee

    • SHA256

      62aaaff7edc15d74aec75d1ba76e1d0bd98a67135da984b8eb018736e31c3004

    • SHA512

      0a1072c8a217a3ab908f751b04c76abc6664b38ae1795bd44bae4aa7f4fddd05ea4dbdec5cc247ab699742da88b0be3ab671a566520db384caa804e0a77c02b3

    • SSDEEP

      768:XocAX3LKew369lp2z3Sd4baFXLjwP/Tgj93b8NIocVSEFnocAX3LKew369lp2z3+:SKcR4mjD9r823FCKcR4mjD9r823Fz

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks