General

  • Target

    de7711ff0df1b36bd31f32f15843905b_JaffaCakes118

  • Size

    842KB

  • Sample

    240913-tfayjswhqc

  • MD5

    de7711ff0df1b36bd31f32f15843905b

  • SHA1

    abd7c78b184f42525f0d7b53ba829e8f81bd2134

  • SHA256

    25d0c4ef21f49c4794220886919feebccbe942bffc1c36b8430b9b005693ce42

  • SHA512

    fa154ea9e1bad8e71434dc4ccef5182fd5eb93880e7fb10ca95da8399edcfcccc52d47cb78c17a0514bf15ca667865030519cf7c3be85b0494e6f9b83bc95428

  • SSDEEP

    12288:JuC9eHN8vWHXsYIugb+94LlvTyFLPkZqVQV3309b+Z2x2G4Q4UFfHak3sD8H7:QCQH2TYqtBTfZqVQBY2Gv4UFfHH328b

Malware Config

Targets

    • Target

      de7711ff0df1b36bd31f32f15843905b_JaffaCakes118

    • Size

      842KB

    • MD5

      de7711ff0df1b36bd31f32f15843905b

    • SHA1

      abd7c78b184f42525f0d7b53ba829e8f81bd2134

    • SHA256

      25d0c4ef21f49c4794220886919feebccbe942bffc1c36b8430b9b005693ce42

    • SHA512

      fa154ea9e1bad8e71434dc4ccef5182fd5eb93880e7fb10ca95da8399edcfcccc52d47cb78c17a0514bf15ca667865030519cf7c3be85b0494e6f9b83bc95428

    • SSDEEP

      12288:JuC9eHN8vWHXsYIugb+94LlvTyFLPkZqVQV3309b+Z2x2G4Q4UFfHak3sD8H7:QCQH2TYqtBTfZqVQBY2Gv4UFfHH328b

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks