General

  • Target

    dcd16c28626ff31886e1c7a77649622e_JaffaCakes118

  • Size

    809KB

  • Sample

    240912-w71z6axhmk

  • MD5

    dcd16c28626ff31886e1c7a77649622e

  • SHA1

    b7adf994886b99e994c5304005ec62b836358132

  • SHA256

    d2490ce4dfdbb5247fbe4023c172f1b0c17211f5581f75b600f887246c754041

  • SHA512

    b23877379c450327e3753bb407151e840c7060643a69d06d2bc974ebae808b23b034e813c8db277e684a16f47b2f9a92445d53236bb7418bb1b8c94e31e314ef

  • SSDEEP

    12288:vFHaYHbqFYTfR2MSz5w4DpOCC3B9aAwfPSioaKJMbBOIBLsXwt3FwMxgvLIZvg:vleWTR6tzpZmBtKPtMMYCQJ

Malware Config

Targets

    • Target

      dcd16c28626ff31886e1c7a77649622e_JaffaCakes118

    • Size

      809KB

    • MD5

      dcd16c28626ff31886e1c7a77649622e

    • SHA1

      b7adf994886b99e994c5304005ec62b836358132

    • SHA256

      d2490ce4dfdbb5247fbe4023c172f1b0c17211f5581f75b600f887246c754041

    • SHA512

      b23877379c450327e3753bb407151e840c7060643a69d06d2bc974ebae808b23b034e813c8db277e684a16f47b2f9a92445d53236bb7418bb1b8c94e31e314ef

    • SSDEEP

      12288:vFHaYHbqFYTfR2MSz5w4DpOCC3B9aAwfPSioaKJMbBOIBLsXwt3FwMxgvLIZvg:vleWTR6tzpZmBtKPtMMYCQJ

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks