General

  • Target

    fa686306d5003d035737f08fa7db0c76_JaffaCakes118

  • Size

    854KB

  • Sample

    240927-pnsq4sseql

  • MD5

    fa686306d5003d035737f08fa7db0c76

  • SHA1

    05939c0b852c98327a14c276a98f343aa2d0ae23

  • SHA256

    88a25a112ca5844b380d40e511cf8f0ea0160b55e0b0a2fbaddba1d8c98b1171

  • SHA512

    e4cafcc2fc5630165dbf33491442a032801fb5b1203e0e871e55346d551e9b51ca53d2fa28511b007560a31736ad962b25aabcdf83de1ab9af4b3c48237c339c

  • SSDEEP

    24576:ch6bDOzVW0StorsxA3baFtu9O/h7KcH9ecrcDt:cAPAWDo4x0baFtLxKcHocrUt

Malware Config

Targets

    • Target

      fa686306d5003d035737f08fa7db0c76_JaffaCakes118

    • Size

      854KB

    • MD5

      fa686306d5003d035737f08fa7db0c76

    • SHA1

      05939c0b852c98327a14c276a98f343aa2d0ae23

    • SHA256

      88a25a112ca5844b380d40e511cf8f0ea0160b55e0b0a2fbaddba1d8c98b1171

    • SHA512

      e4cafcc2fc5630165dbf33491442a032801fb5b1203e0e871e55346d551e9b51ca53d2fa28511b007560a31736ad962b25aabcdf83de1ab9af4b3c48237c339c

    • SSDEEP

      24576:ch6bDOzVW0StorsxA3baFtu9O/h7KcH9ecrcDt:cAPAWDo4x0baFtLxKcHocrUt

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks