General

  • Target

    06256d0250ae6c1c1774b3433bf0d76c_JaffaCakes118

  • Size

    874KB

  • Sample

    241001-rgnjxstbkq

  • MD5

    06256d0250ae6c1c1774b3433bf0d76c

  • SHA1

    a87959a763876882ca6c7930da11e9470bb239eb

  • SHA256

    a1cab1efff5b57b4e16bbf72be113db73eb72b7e4b46768732165df7ec44ab93

  • SHA512

    fa529e5fe677165e82ce1d1c0b2e59f20da45222cb8fad59101631eee51715f2e94a9e3e9f33e798641d30733d313181a999bc323d7b17bdb8208116ceb28d89

  • SSDEEP

    12288:y2AJTpBzcB6KVlJ7MqzhZnMMjB50+2mY03JUAiLfw1nhE6mt0e5S+GPq/NxRSd1r:iURTSwMcB5rY03Jefw1nhEseA+FRKiq

Malware Config

Targets

    • Target

      06256d0250ae6c1c1774b3433bf0d76c_JaffaCakes118

    • Size

      874KB

    • MD5

      06256d0250ae6c1c1774b3433bf0d76c

    • SHA1

      a87959a763876882ca6c7930da11e9470bb239eb

    • SHA256

      a1cab1efff5b57b4e16bbf72be113db73eb72b7e4b46768732165df7ec44ab93

    • SHA512

      fa529e5fe677165e82ce1d1c0b2e59f20da45222cb8fad59101631eee51715f2e94a9e3e9f33e798641d30733d313181a999bc323d7b17bdb8208116ceb28d89

    • SSDEEP

      12288:y2AJTpBzcB6KVlJ7MqzhZnMMjB50+2mY03JUAiLfw1nhE6mt0e5S+GPq/NxRSd1r:iURTSwMcB5rY03Jefw1nhEseA+FRKiq

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks