General

  • Target

    d53e1fd335365b1ef134d07eb861c402_JaffaCakes118

  • Size

    2.8MB

  • Sample

    240908-2xd1jazbnr

  • MD5

    d53e1fd335365b1ef134d07eb861c402

  • SHA1

    5d6616769a256a3b6cfcb242a8522157b8874d60

  • SHA256

    a860f0dc3d18d1e6fc0fa316cc363c23832868425d8489fcc1e443de19d864f8

  • SHA512

    d7cb5eac5d64b2e63af2d199c428e8d9bd3450e78910e6ef181a9e3a8e637e763a363da448f1eae07ed9b1567b3f41585999517d6743ead13a4f4d5b586a1711

  • SSDEEP

    49152:OJgd73Il7j/h+n1qB3qKXhnbyMMku5vEFTyfvIdFo37mGGRIWpZ:b2/hQV+hnBM7E0fw8mDRbpZ

Malware Config

Targets

    • Target

      d53e1fd335365b1ef134d07eb861c402_JaffaCakes118

    • Size

      2.8MB

    • MD5

      d53e1fd335365b1ef134d07eb861c402

    • SHA1

      5d6616769a256a3b6cfcb242a8522157b8874d60

    • SHA256

      a860f0dc3d18d1e6fc0fa316cc363c23832868425d8489fcc1e443de19d864f8

    • SHA512

      d7cb5eac5d64b2e63af2d199c428e8d9bd3450e78910e6ef181a9e3a8e637e763a363da448f1eae07ed9b1567b3f41585999517d6743ead13a4f4d5b586a1711

    • SSDEEP

      49152:OJgd73Il7j/h+n1qB3qKXhnbyMMku5vEFTyfvIdFo37mGGRIWpZ:b2/hQV+hnBM7E0fw8mDRbpZ

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks