General

  • Target

    f5c6c27712a5569b304ff01ca5b1c7c8_JaffaCakes118

  • Size

    136KB

  • Sample

    240925-l875razcmk

  • MD5

    f5c6c27712a5569b304ff01ca5b1c7c8

  • SHA1

    5f4cc37234cd430b71f3577e9ba38e5f6112ef33

  • SHA256

    0920dc44442e04d196db33657904fa09414b02c767c56ef06b17d6a5ef2d5f53

  • SHA512

    8516098a5e227141cd6c24e3fd8e78d21f37ec9574193282b5b6bf81ad3bb7260041ceb5cd2a6193d5f54023862af8beb9686a479ee0b4334cac0b8d79d208ab

  • SSDEEP

    3072:MVP+ZJePc0+wJmWpCCNH0aAW9Bk6VKaVmBPxReklfxGYjuGmh:MVHPc0CeTnAKVKaghbXVUGm

Malware Config

Targets

    • Target

      f5c6c27712a5569b304ff01ca5b1c7c8_JaffaCakes118

    • Size

      136KB

    • MD5

      f5c6c27712a5569b304ff01ca5b1c7c8

    • SHA1

      5f4cc37234cd430b71f3577e9ba38e5f6112ef33

    • SHA256

      0920dc44442e04d196db33657904fa09414b02c767c56ef06b17d6a5ef2d5f53

    • SHA512

      8516098a5e227141cd6c24e3fd8e78d21f37ec9574193282b5b6bf81ad3bb7260041ceb5cd2a6193d5f54023862af8beb9686a479ee0b4334cac0b8d79d208ab

    • SSDEEP

      3072:MVP+ZJePc0+wJmWpCCNH0aAW9Bk6VKaVmBPxReklfxGYjuGmh:MVHPc0CeTnAKVKaghbXVUGm

    • Phoenix Keylogger

      Phoenix is a keylogger and info stealer first seen in July 2019.

    • Phoenix Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks