General

  • Target

    04f273a042e83eebdc138f32a9547df5_JaffaCakes118

  • Size

    62KB

  • Sample

    241001-jwn51ayeqm

  • MD5

    04f273a042e83eebdc138f32a9547df5

  • SHA1

    2fa809ebd777b16647987cd89173cbd1cd007000

  • SHA256

    f5097070861eef9727641d57a9be1ef130da95ba470b35946f25179788034762

  • SHA512

    064f5c7d32c96319fd981d5032124850839d31689d44790a16a8343f3a8c90843335a0998b55103382d0c1e65b7ecc8d34e59b33faf01c48794ea7a4af6d56f6

  • SSDEEP

    768:KKsMqCXfVcWpjDMLoiANIUcdYLDwUzc80gmq3oP/oDT:KKseVMLoiAPRr/0O8/oP

Malware Config

Targets

    • Target

      04f273a042e83eebdc138f32a9547df5_JaffaCakes118

    • Size

      62KB

    • MD5

      04f273a042e83eebdc138f32a9547df5

    • SHA1

      2fa809ebd777b16647987cd89173cbd1cd007000

    • SHA256

      f5097070861eef9727641d57a9be1ef130da95ba470b35946f25179788034762

    • SHA512

      064f5c7d32c96319fd981d5032124850839d31689d44790a16a8343f3a8c90843335a0998b55103382d0c1e65b7ecc8d34e59b33faf01c48794ea7a4af6d56f6

    • SSDEEP

      768:KKsMqCXfVcWpjDMLoiANIUcdYLDwUzc80gmq3oP/oDT:KKseVMLoiAPRr/0O8/oP

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Renames multiple (81) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks