General

  • Target

    d29ee598b76d73930619b17c2f376cf8_JaffaCakes118

  • Size

    856KB

  • Sample

    240907-xkgtfa1gmc

  • MD5

    d29ee598b76d73930619b17c2f376cf8

  • SHA1

    f71d0814426222cab8b373c3a7b6ccfe59c8089a

  • SHA256

    e79e46889ad1ef593cd696cdb5235947c372c42c5e0d99a4e001e0069f7fd3d6

  • SHA512

    1f7f36c6e9d5fe4d4568e3d679e370983498301c5f3632f9237468e01087b42bd7fff83724d1f6e9a7f82e484e78770eaa177059a083783b4d7169776797865d

  • SSDEEP

    24576:vWjZ2HChoSdA+zUcqys8YEsbsjan7Leeood9HgyPR:eh7SMZsbnd9A

Malware Config

Targets

    • Target

      d29ee598b76d73930619b17c2f376cf8_JaffaCakes118

    • Size

      856KB

    • MD5

      d29ee598b76d73930619b17c2f376cf8

    • SHA1

      f71d0814426222cab8b373c3a7b6ccfe59c8089a

    • SHA256

      e79e46889ad1ef593cd696cdb5235947c372c42c5e0d99a4e001e0069f7fd3d6

    • SHA512

      1f7f36c6e9d5fe4d4568e3d679e370983498301c5f3632f9237468e01087b42bd7fff83724d1f6e9a7f82e484e78770eaa177059a083783b4d7169776797865d

    • SSDEEP

      24576:vWjZ2HChoSdA+zUcqys8YEsbsjan7Leeood9HgyPR:eh7SMZsbnd9A

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks