General

  • Target

    c772e73c275f0ebf16b772539188dd53_JaffaCakes118

  • Size

    493KB

  • Sample

    240828-xk32ns1bqf

  • MD5

    c772e73c275f0ebf16b772539188dd53

  • SHA1

    0dce12f9887b3e4ac11f1459624e450c455fa4cc

  • SHA256

    137cc20abd49dfc1d858183e47c0ac02cb2e52eb970a36e21461792348b3bbc5

  • SHA512

    f93dd548b5b5995a230329d2e31cc7f54b5ab99c41529be3ca5cb05994f0999640bff8c0bf8d579bad2f7d6094fd88d5b62b4fa06bad89c7bbb98f3e1d386e2f

  • SSDEEP

    12288:zXCNi9BipT7m/f1fBt85q5dL/GLxHyb51kmxBtrpB:2Wy7m/dfOIMLxH4smFz

Malware Config

Targets

    • Target

      c772e73c275f0ebf16b772539188dd53_JaffaCakes118

    • Size

      493KB

    • MD5

      c772e73c275f0ebf16b772539188dd53

    • SHA1

      0dce12f9887b3e4ac11f1459624e450c455fa4cc

    • SHA256

      137cc20abd49dfc1d858183e47c0ac02cb2e52eb970a36e21461792348b3bbc5

    • SHA512

      f93dd548b5b5995a230329d2e31cc7f54b5ab99c41529be3ca5cb05994f0999640bff8c0bf8d579bad2f7d6094fd88d5b62b4fa06bad89c7bbb98f3e1d386e2f

    • SSDEEP

      12288:zXCNi9BipT7m/f1fBt85q5dL/GLxHyb51kmxBtrpB:2Wy7m/dfOIMLxH4smFz

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks