General

  • Target

    a66704fa99111103386727ef5eee679d_JaffaCakes118

  • Size

    6.6MB

  • Sample

    240818-mdltpssbjm

  • MD5

    a66704fa99111103386727ef5eee679d

  • SHA1

    7595e38bf1e39aba91813f341f3f012c25e4faf7

  • SHA256

    6c4c8cfd02098f6f3b43bcc9fbcadeeebacf6c2d0c9c6b8334c4ec1b120cefec

  • SHA512

    1e944ee55402da2161270e1946177b1183ffa12e22d924e568b9b2e2d11915635b96bee1434c922c0d6bf43526430dac7a834714f3d91c3c176ac2076877571e

  • SSDEEP

    196608:GC+gp1DM9onJ5hrZER9xQ3jo4UQ7+wKIAFuD:7pNM9c5hlER9xA2QSXIA

Malware Config

Targets

    • Target

      a66704fa99111103386727ef5eee679d_JaffaCakes118

    • Size

      6.6MB

    • MD5

      a66704fa99111103386727ef5eee679d

    • SHA1

      7595e38bf1e39aba91813f341f3f012c25e4faf7

    • SHA256

      6c4c8cfd02098f6f3b43bcc9fbcadeeebacf6c2d0c9c6b8334c4ec1b120cefec

    • SHA512

      1e944ee55402da2161270e1946177b1183ffa12e22d924e568b9b2e2d11915635b96bee1434c922c0d6bf43526430dac7a834714f3d91c3c176ac2076877571e

    • SSDEEP

      196608:GC+gp1DM9onJ5hrZER9xQ3jo4UQ7+wKIAFuD:7pNM9c5hlER9xA2QSXIA

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks