General

  • Target

    ed498471068c50ccdad664f698b56f4a_JaffaCakes118

  • Size

    172KB

  • Sample

    240920-lax7wszbnk

  • MD5

    ed498471068c50ccdad664f698b56f4a

  • SHA1

    26587940f0d41b1cc6dd2954b7d1cad0e77dd765

  • SHA256

    20913ed5548410745729c3f425f22bdf4e6acb47afa79756911fe5946b5f835c

  • SHA512

    a0f71dcfb163560032e883b69930c2240a695e50bb3f36693106b0144202067f321247bfa61effd84565fe89dcecce40d3d45c8a5629aeb734e25876ade86afd

  • SSDEEP

    3072:6UijtdFH9aEdozWO/sn3IFEUEckt5kFxmjmfGZKKXZxvpDNR4Cb/jteHV:6JFo/1FEUjk20mOZfZxvpBbVeHV

Malware Config

Targets

    • Target

      ed498471068c50ccdad664f698b56f4a_JaffaCakes118

    • Size

      172KB

    • MD5

      ed498471068c50ccdad664f698b56f4a

    • SHA1

      26587940f0d41b1cc6dd2954b7d1cad0e77dd765

    • SHA256

      20913ed5548410745729c3f425f22bdf4e6acb47afa79756911fe5946b5f835c

    • SHA512

      a0f71dcfb163560032e883b69930c2240a695e50bb3f36693106b0144202067f321247bfa61effd84565fe89dcecce40d3d45c8a5629aeb734e25876ade86afd

    • SSDEEP

      3072:6UijtdFH9aEdozWO/sn3IFEUEckt5kFxmjmfGZKKXZxvpDNR4Cb/jteHV:6JFo/1FEUjk20mOZfZxvpBbVeHV

    • Modifies security service

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks