General

  • Target

    f69824d6f7fccea7643fb41119eae66e_JaffaCakes118

  • Size

    797KB

  • Sample

    240925-wy2v4azdrk

  • MD5

    f69824d6f7fccea7643fb41119eae66e

  • SHA1

    13a8174f328a9477cd6e53e463b919776336decc

  • SHA256

    eb9ecc10663ff420eb871ade6a24f4572356a71514f9982bce01b5a3e066236b

  • SHA512

    a97eae11e6eb4c5a42e484c4aee82eb39754a43a09afdb5605dc187ff0610db12bc05017ee34d7098f0a53081b579c5997a1e2d64b020de798f8bd68b103b8dd

  • SSDEEP

    24576:B3Ko04QBACZmOa1XxLi7Rc+BGyaMSnRBpMmD7:B3Ko0/5uhgc+BNaMYRB5

Malware Config

Targets

    • Target

      f69824d6f7fccea7643fb41119eae66e_JaffaCakes118

    • Size

      797KB

    • MD5

      f69824d6f7fccea7643fb41119eae66e

    • SHA1

      13a8174f328a9477cd6e53e463b919776336decc

    • SHA256

      eb9ecc10663ff420eb871ade6a24f4572356a71514f9982bce01b5a3e066236b

    • SHA512

      a97eae11e6eb4c5a42e484c4aee82eb39754a43a09afdb5605dc187ff0610db12bc05017ee34d7098f0a53081b579c5997a1e2d64b020de798f8bd68b103b8dd

    • SSDEEP

      24576:B3Ko04QBACZmOa1XxLi7Rc+BGyaMSnRBpMmD7:B3Ko0/5uhgc+BNaMYRB5

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks