General

  • Target

    caaf60c089e04c0c57acc2e1a1f8b01c_JaffaCakes118

  • Size

    287KB

  • Sample

    240830-mw2b4s1gjp

  • MD5

    caaf60c089e04c0c57acc2e1a1f8b01c

  • SHA1

    1d21e97578db99a5a596695fa908a1616e319b03

  • SHA256

    c3571d5888250683eca3b201dc9d6d54e66d49624c9e2f0e8f7802334188a154

  • SHA512

    f3ec6014c41796b2d076619bddbe269c8dc5ea8f0641f9df89ebcf69cae4245288d9489abd030fab2df81d3567698ab752851b5b22f3ccffd781181f7644cedc

  • SSDEEP

    6144:d0F/Kpm6dNAUmmS0QU/81h70QaDDhhy+8/mOnK:EKE8QU01h0/I/

Malware Config

Targets

    • Target

      caaf60c089e04c0c57acc2e1a1f8b01c_JaffaCakes118

    • Size

      287KB

    • MD5

      caaf60c089e04c0c57acc2e1a1f8b01c

    • SHA1

      1d21e97578db99a5a596695fa908a1616e319b03

    • SHA256

      c3571d5888250683eca3b201dc9d6d54e66d49624c9e2f0e8f7802334188a154

    • SHA512

      f3ec6014c41796b2d076619bddbe269c8dc5ea8f0641f9df89ebcf69cae4245288d9489abd030fab2df81d3567698ab752851b5b22f3ccffd781181f7644cedc

    • SSDEEP

      6144:d0F/Kpm6dNAUmmS0QU/81h70QaDDhhy+8/mOnK:EKE8QU01h0/I/

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks