General

  • Target

    f830be2a4a74177a99819ceba7877875_JaffaCakes118

  • Size

    309KB

  • Sample

    240926-mqjvwawcmb

  • MD5

    f830be2a4a74177a99819ceba7877875

  • SHA1

    64029b04c945ceeb8ac8018e8d993ae9fbb09dbe

  • SHA256

    4f461c1102bae68097c3f874fdce20ef4f476be038cc76f593ebe8c188a202b0

  • SHA512

    93d52a7a3efaaefc6e3b901e3b7c6337995e07636e60793fb57fc8ee22e200fb53e78549a6cbf1be4302df5328e924f0f95134790bc41610960e9090e6176c0e

  • SSDEEP

    6144:IqnvlYNg4LVaQz+C0X/T3PxcUVXnMIK3bvC/Nh4:Fv+XRa1Jb3pLVXMIK3Lgh4

Malware Config

Targets

    • Target

      f830be2a4a74177a99819ceba7877875_JaffaCakes118

    • Size

      309KB

    • MD5

      f830be2a4a74177a99819ceba7877875

    • SHA1

      64029b04c945ceeb8ac8018e8d993ae9fbb09dbe

    • SHA256

      4f461c1102bae68097c3f874fdce20ef4f476be038cc76f593ebe8c188a202b0

    • SHA512

      93d52a7a3efaaefc6e3b901e3b7c6337995e07636e60793fb57fc8ee22e200fb53e78549a6cbf1be4302df5328e924f0f95134790bc41610960e9090e6176c0e

    • SSDEEP

      6144:IqnvlYNg4LVaQz+C0X/T3PxcUVXnMIK3bvC/Nh4:Fv+XRa1Jb3pLVXMIK3Lgh4

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks