General

  • Target

    e916f53b3545947b0f1b5bc0e902d439_JaffaCakes118

  • Size

    5.7MB

  • Sample

    240918-pdmr4szdnh

  • MD5

    e916f53b3545947b0f1b5bc0e902d439

  • SHA1

    b40880c3fb70624f7536c2e17dbad9bb2c67cfc7

  • SHA256

    06ea88bb1241198ea56caa22e7cece303a2c38cd354243c770cc6ae1353e722d

  • SHA512

    a11ac276872d1245296416a537edf4837a3d4acaa7f7be65196a385a11ef942cc56b95ed36081cc28196e1a165f778df664de5a05f3af6201ed896b58222f187

  • SSDEEP

    98304:5vSziB1fgSulbR4rKi0qrPaM8j4zFu2McOMkhYiv3zXHPRgL7XO3p0q6l:oiBNjwOrKiHrPwII2oMqYUrs7XOZ6

Malware Config

Targets

    • Target

      e916f53b3545947b0f1b5bc0e902d439_JaffaCakes118

    • Size

      5.7MB

    • MD5

      e916f53b3545947b0f1b5bc0e902d439

    • SHA1

      b40880c3fb70624f7536c2e17dbad9bb2c67cfc7

    • SHA256

      06ea88bb1241198ea56caa22e7cece303a2c38cd354243c770cc6ae1353e722d

    • SHA512

      a11ac276872d1245296416a537edf4837a3d4acaa7f7be65196a385a11ef942cc56b95ed36081cc28196e1a165f778df664de5a05f3af6201ed896b58222f187

    • SSDEEP

      98304:5vSziB1fgSulbR4rKi0qrPaM8j4zFu2McOMkhYiv3zXHPRgL7XO3p0q6l:oiBNjwOrKiHrPwII2oMqYUrs7XOZ6

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Shurk

      Shurk is an infostealer, written in C++ which appeared in 2021.

    • Shurk Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks