General

  • Target

    ef074b09f54ec2aeebe86630610b5264_JaffaCakes118

  • Size

    336KB

  • Sample

    240921-ekfl9stgrp

  • MD5

    ef074b09f54ec2aeebe86630610b5264

  • SHA1

    dc359c5eb6458fe857d45f14fbeba52a4505b015

  • SHA256

    c9740ae7ab48f6484df34b210af2d80ee5964d279faa71fc4dedbdfa38443337

  • SHA512

    138b1145bc3810b4f2f1acc208a35e6e58e2805000a402f6c69431f8c6213e561fab04df56e90300c28e80380e5c58e576f3da0acfb26b1ce9337a910622b391

  • SSDEEP

    6144:pc0xzEDTFP9o5kNkCsGiHCZBUcpni+SJlbMSNadvhLndXAOAfFpHnd9UwYqZWzN2:prxzGFP9o5ysGiH8BUcpniVzbVCvhb+r

Malware Config

Targets

    • Target

      ef074b09f54ec2aeebe86630610b5264_JaffaCakes118

    • Size

      336KB

    • MD5

      ef074b09f54ec2aeebe86630610b5264

    • SHA1

      dc359c5eb6458fe857d45f14fbeba52a4505b015

    • SHA256

      c9740ae7ab48f6484df34b210af2d80ee5964d279faa71fc4dedbdfa38443337

    • SHA512

      138b1145bc3810b4f2f1acc208a35e6e58e2805000a402f6c69431f8c6213e561fab04df56e90300c28e80380e5c58e576f3da0acfb26b1ce9337a910622b391

    • SSDEEP

      6144:pc0xzEDTFP9o5kNkCsGiHCZBUcpni+SJlbMSNadvhLndXAOAfFpHnd9UwYqZWzN2:prxzGFP9o5ysGiH8BUcpniVzbVCvhb+r

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks