General

  • Target

    c1e46f269545b8a8d6e5120c66e6743a_JaffaCakes118

  • Size

    802KB

  • Sample

    240826-ak7zasvgqr

  • MD5

    c1e46f269545b8a8d6e5120c66e6743a

  • SHA1

    4b2a175ed7f52fd13da6c940f1a8c8b5eb30f603

  • SHA256

    cee275d4c037222bc508ae9760e44a9808ad896a7804c6d9b439e25e0ec12d4b

  • SHA512

    e28160b2cbce72e624dd7bf6dabaa650048982309e8b1e222cd61eab19684c9123251ba38f60bb9f70e586529bf81ec361eb385095934fb2691e1a87a4dd2a5f

  • SSDEEP

    24576:fsksSsT4aifmPi5mnW5y5N16vD6ZqTyZ48rc:QSsTuqiQW5+NuyZ4f

Malware Config

Targets

    • Target

      c1e46f269545b8a8d6e5120c66e6743a_JaffaCakes118

    • Size

      802KB

    • MD5

      c1e46f269545b8a8d6e5120c66e6743a

    • SHA1

      4b2a175ed7f52fd13da6c940f1a8c8b5eb30f603

    • SHA256

      cee275d4c037222bc508ae9760e44a9808ad896a7804c6d9b439e25e0ec12d4b

    • SHA512

      e28160b2cbce72e624dd7bf6dabaa650048982309e8b1e222cd61eab19684c9123251ba38f60bb9f70e586529bf81ec361eb385095934fb2691e1a87a4dd2a5f

    • SSDEEP

      24576:fsksSsT4aifmPi5mnW5y5N16vD6ZqTyZ48rc:QSsTuqiQW5+NuyZ4f

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks