General

  • Target

    eaa2aa166574c4537ec7cfd5907143db_JaffaCakes118

  • Size

    3.1MB

  • Sample

    240919-fqb2pssejk

  • MD5

    eaa2aa166574c4537ec7cfd5907143db

  • SHA1

    01c935c9c9c026cfa700c36fecfd9a1f6cfa4b15

  • SHA256

    84d3664c8937dba0b054aa21c0d8517255024eba4566dc672bf3f3e594220131

  • SHA512

    df15eeb264747f1129acfca387802cd33f0760eeb3e0a66e1113761ea014de5c8af845f92cf7ba3554624d94c77ad071149702809aa8c95ee9ea4fffaed7bf20

  • SSDEEP

    49152:ZUuBTOjZwS1Ihk+hy7iHuaRZnt+NTNLiG97B:ZXRO0hkr2Rxt+ek

Malware Config

Targets

    • Target

      eaa2aa166574c4537ec7cfd5907143db_JaffaCakes118

    • Size

      3.1MB

    • MD5

      eaa2aa166574c4537ec7cfd5907143db

    • SHA1

      01c935c9c9c026cfa700c36fecfd9a1f6cfa4b15

    • SHA256

      84d3664c8937dba0b054aa21c0d8517255024eba4566dc672bf3f3e594220131

    • SHA512

      df15eeb264747f1129acfca387802cd33f0760eeb3e0a66e1113761ea014de5c8af845f92cf7ba3554624d94c77ad071149702809aa8c95ee9ea4fffaed7bf20

    • SSDEEP

      49152:ZUuBTOjZwS1Ihk+hy7iHuaRZnt+NTNLiG97B:ZXRO0hkr2Rxt+ek

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks