General

  • Target

    d568107809815871a46169f63ac52e0c_JaffaCakes118

  • Size

    1.6MB

  • Sample

    240909-bcajhawfqe

  • MD5

    d568107809815871a46169f63ac52e0c

  • SHA1

    84cff3d39a345706c3fbff66ec72d8e8c8322307

  • SHA256

    434ee6626c57de4b6598963ce3f6ccc75421edc0126fa6f544a90f83e658c50a

  • SHA512

    c78bdbdc012be9cc3c77c02f7761602908bb13f294e63067779a49b65b492c6b3a8bcc46f3a2a790e829b0b6b6f956dc5abce2798c4af1cc08abd8126311b20f

  • SSDEEP

    24576:s/6UFMg4CBGR24IBMEwYXJnKimLghcgyPsmwKP0gR7QAaItHtL51P+zZlw/GObFw:JOBG8Nlw8blcg9hK8S7Hv51PpJ6

Malware Config

Targets

    • Target

      d568107809815871a46169f63ac52e0c_JaffaCakes118

    • Size

      1.6MB

    • MD5

      d568107809815871a46169f63ac52e0c

    • SHA1

      84cff3d39a345706c3fbff66ec72d8e8c8322307

    • SHA256

      434ee6626c57de4b6598963ce3f6ccc75421edc0126fa6f544a90f83e658c50a

    • SHA512

      c78bdbdc012be9cc3c77c02f7761602908bb13f294e63067779a49b65b492c6b3a8bcc46f3a2a790e829b0b6b6f956dc5abce2798c4af1cc08abd8126311b20f

    • SSDEEP

      24576:s/6UFMg4CBGR24IBMEwYXJnKimLghcgyPsmwKP0gR7QAaItHtL51P+zZlw/GObFw:JOBG8Nlw8blcg9hK8S7Hv51PpJ6

    • Event Triggered Execution: Image File Execution Options Injection

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks