General

  • Target

    eb6acd9b12d5ca4b7df654a39813f309_JaffaCakes118

  • Size

    170KB

  • Sample

    240919-ql7b6azgkg

  • MD5

    eb6acd9b12d5ca4b7df654a39813f309

  • SHA1

    40804ba7ce624f93de1ab9370914aca49a90a27e

  • SHA256

    6ce94ab991c464563fa8fe9d056c16824e5d2e618fa2eaa451f96bbecd7f630f

  • SHA512

    09885da75142ee3a7a662d960e73db08af5e2ec60687be9da60e8879b6b41f3398abb1d446a98da30989f62796023721a20ef2d5e042ea62e449494fddeab5d8

  • SSDEEP

    3072:+5ERKdsNSE8jWf+FnGevgjFA+WzmLpJhJ4RpS:+wB8qonGeoFA0lyp

Malware Config

Targets

    • Target

      eb6acd9b12d5ca4b7df654a39813f309_JaffaCakes118

    • Size

      170KB

    • MD5

      eb6acd9b12d5ca4b7df654a39813f309

    • SHA1

      40804ba7ce624f93de1ab9370914aca49a90a27e

    • SHA256

      6ce94ab991c464563fa8fe9d056c16824e5d2e618fa2eaa451f96bbecd7f630f

    • SHA512

      09885da75142ee3a7a662d960e73db08af5e2ec60687be9da60e8879b6b41f3398abb1d446a98da30989f62796023721a20ef2d5e042ea62e449494fddeab5d8

    • SSDEEP

      3072:+5ERKdsNSE8jWf+FnGevgjFA+WzmLpJhJ4RpS:+wB8qonGeoFA0lyp

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks