General

  • Target

    043fbd84e0a00c3fbf71b88a3e2739bc_JaffaCakes118

  • Size

    60KB

  • Sample

    241001-eayp4atajc

  • MD5

    043fbd84e0a00c3fbf71b88a3e2739bc

  • SHA1

    02f42bcab70e675d309a89b34125461cde1a7ea5

  • SHA256

    39c7f0761cb71570fc1a3dda81f18f97ac6d58e15b7b24cdadc9cf60dffd18a1

  • SHA512

    26506f5843c573f2b1a8c4923a4b38d83e998a6a34d1ce087e127a9099fb04f7baa5d6d4bc166ccd4094220054f569e54bac9403bd4944d62ca225bd0bc16660

  • SSDEEP

    768:mOucKn7n1JXDNANIUNbvLDwUzc80gmq3oP/oDk:mO2XDNAPNr/0O8/og

Malware Config

Targets

    • Target

      043fbd84e0a00c3fbf71b88a3e2739bc_JaffaCakes118

    • Size

      60KB

    • MD5

      043fbd84e0a00c3fbf71b88a3e2739bc

    • SHA1

      02f42bcab70e675d309a89b34125461cde1a7ea5

    • SHA256

      39c7f0761cb71570fc1a3dda81f18f97ac6d58e15b7b24cdadc9cf60dffd18a1

    • SHA512

      26506f5843c573f2b1a8c4923a4b38d83e998a6a34d1ce087e127a9099fb04f7baa5d6d4bc166ccd4094220054f569e54bac9403bd4944d62ca225bd0bc16660

    • SSDEEP

      768:mOucKn7n1JXDNANIUNbvLDwUzc80gmq3oP/oDk:mO2XDNAPNr/0O8/og

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Renames multiple (95) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks