General

  • Target

    eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118

  • Size

    845KB

  • Sample

    240919-ghchyatdlg

  • MD5

    eab2df02d7c5647e4b2838349d81f7d2

  • SHA1

    f10d2e0ed5c13f04190cc141b51f1f60368f8164

  • SHA256

    e6c88149ac0c62690a6416eb46c5af8f790c2f25da974737ae7cb196e40b5f2b

  • SHA512

    5bbae44eb653d659528df12ba81022df23f055dff81fa45cff6ea1fecb8aaa87e23a46ce7f004c904251d62344f5a28e1364db523abb9e62fafa5c03feb96cac

  • SSDEEP

    24576:1fUT67H4f6l1iIf9mT9SiwDzZr+pHlgQzlxn68bpVFnh:1fi6LJ/5nZr+VlgQzlxhFVFnh

Malware Config

Targets

    • Target

      eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118

    • Size

      845KB

    • MD5

      eab2df02d7c5647e4b2838349d81f7d2

    • SHA1

      f10d2e0ed5c13f04190cc141b51f1f60368f8164

    • SHA256

      e6c88149ac0c62690a6416eb46c5af8f790c2f25da974737ae7cb196e40b5f2b

    • SHA512

      5bbae44eb653d659528df12ba81022df23f055dff81fa45cff6ea1fecb8aaa87e23a46ce7f004c904251d62344f5a28e1364db523abb9e62fafa5c03feb96cac

    • SSDEEP

      24576:1fUT67H4f6l1iIf9mT9SiwDzZr+pHlgQzlxn68bpVFnh:1fi6LJ/5nZr+VlgQzlxhFVFnh

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks