General

  • Target

    b3481f80a1f43828e995dffc89a17d6b_JaffaCakes118

  • Size

    184KB

  • Sample

    240821-nkf3gawbld

  • MD5

    b3481f80a1f43828e995dffc89a17d6b

  • SHA1

    28e71102ea1b7bb92c9b3889ad1d248909c07945

  • SHA256

    6b56acbf22bcb8eb4e96534d6ba3c31aafe17ac59b10ef50bbfb740f79ff2839

  • SHA512

    65321e3764a1947ec4389265bdc16e55e6b878c6e37e55dc628c49808e0597b7e3a5bde31b60dbb53b963302b7d0f609b1e486314e24fa18202a947be9ce234c

  • SSDEEP

    3072:93DiyRTKrOXnfzgRvzDPFcml6X5btuTexExXr7GFST:dhgObgvc26XgWExXWkT

Malware Config

Targets

    • Target

      b3481f80a1f43828e995dffc89a17d6b_JaffaCakes118

    • Size

      184KB

    • MD5

      b3481f80a1f43828e995dffc89a17d6b

    • SHA1

      28e71102ea1b7bb92c9b3889ad1d248909c07945

    • SHA256

      6b56acbf22bcb8eb4e96534d6ba3c31aafe17ac59b10ef50bbfb740f79ff2839

    • SHA512

      65321e3764a1947ec4389265bdc16e55e6b878c6e37e55dc628c49808e0597b7e3a5bde31b60dbb53b963302b7d0f609b1e486314e24fa18202a947be9ce234c

    • SSDEEP

      3072:93DiyRTKrOXnfzgRvzDPFcml6X5btuTexExXr7GFST:dhgObgvc26XgWExXWkT

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks