General

  • Target

    b6251d6f1a7ff705616b6eda9a9430d7_JaffaCakes118

  • Size

    848KB

  • Sample

    240822-dspdpszarq

  • MD5

    b6251d6f1a7ff705616b6eda9a9430d7

  • SHA1

    02da09680f5ed92e6efe89fc0b2b6a7eb62cde64

  • SHA256

    9df2f19fe78aba258e20b247c1c14cfdf78c0cd4ef37878518e4d7daf0f61fa1

  • SHA512

    2600417e15d2a0ccdf51aed75fd187d99deaaa15715b5c7e67dda871aa96fa619899684922e1c441e550ed523a20a478c1367fd6447b47cad49d534ac511c6eb

  • SSDEEP

    24576:RmZo+bYVAFhgH71wFQl/O10JC2v1Uf0pgs0kuO2:RmZThDCJ/tzv1U8plqO2

Malware Config

Targets

    • Target

      b6251d6f1a7ff705616b6eda9a9430d7_JaffaCakes118

    • Size

      848KB

    • MD5

      b6251d6f1a7ff705616b6eda9a9430d7

    • SHA1

      02da09680f5ed92e6efe89fc0b2b6a7eb62cde64

    • SHA256

      9df2f19fe78aba258e20b247c1c14cfdf78c0cd4ef37878518e4d7daf0f61fa1

    • SHA512

      2600417e15d2a0ccdf51aed75fd187d99deaaa15715b5c7e67dda871aa96fa619899684922e1c441e550ed523a20a478c1367fd6447b47cad49d534ac511c6eb

    • SSDEEP

      24576:RmZo+bYVAFhgH71wFQl/O10JC2v1Uf0pgs0kuO2:RmZThDCJ/tzv1U8plqO2

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks