General

  • Target

    d1ea79ea1463576436a7e68f37a2901d_JaffaCakes118

  • Size

    13KB

  • Sample

    240907-pfqlsaterr

  • MD5

    d1ea79ea1463576436a7e68f37a2901d

  • SHA1

    c969c95c7a457d6ea5ec3de4f72a07c4f3e056a4

  • SHA256

    fecd4ce82f2210ed55571058b64d6a156876a0e9176d998b37575cf1b3cecf1c

  • SHA512

    51c789732b1c80ff671d8e41f0db89481f8f72542500f2b3d254d16954078a80e80cd175d694a0f5eebaa6cfce085411daa0f6c5d4b40b534ce47ac0195a6aa7

  • SSDEEP

    192:xqdsICa/p0PtSFqMa7p/Ok5fvIYXQLFXh6hY1CYT2X8M3cpksHrNINEd7nLVdpGV:x2gtNO4IYXQ5X4oCYqX8MscunJ/GVMa

Malware Config

Targets

    • Target

      d1ea79ea1463576436a7e68f37a2901d_JaffaCakes118

    • Size

      13KB

    • MD5

      d1ea79ea1463576436a7e68f37a2901d

    • SHA1

      c969c95c7a457d6ea5ec3de4f72a07c4f3e056a4

    • SHA256

      fecd4ce82f2210ed55571058b64d6a156876a0e9176d998b37575cf1b3cecf1c

    • SHA512

      51c789732b1c80ff671d8e41f0db89481f8f72542500f2b3d254d16954078a80e80cd175d694a0f5eebaa6cfce085411daa0f6c5d4b40b534ce47ac0195a6aa7

    • SSDEEP

      192:xqdsICa/p0PtSFqMa7p/Ok5fvIYXQLFXh6hY1CYT2X8M3cpksHrNINEd7nLVdpGV:x2gtNO4IYXQ5X4oCYqX8MscunJ/GVMa

    • Modifies visiblity of hidden/system files in Explorer

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Modifies WinLogon

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks