General

  • Target

    0692d0ca8901c88aaf87370429031adb_JaffaCakes118

  • Size

    944KB

  • Sample

    241001-t7s87szcll

  • MD5

    0692d0ca8901c88aaf87370429031adb

  • SHA1

    055ed12e164ff646fef3ce5a3d4ed2f80cba0eaa

  • SHA256

    1a2d782e38782327b176d295eaf860b844571d4b3521f8bc552a411bf4c1b27b

  • SHA512

    a644a5c7254f048a835d6e0f6f06b79ce6985c7f83014f603dc1cd8cd316118cda16b1c87be19c2afb3a5f68fc4160565a1c8a53dd83e3add06d02421cdfd00e

  • SSDEEP

    24576:MJYeZFzaJMVrWbPFi4zpKgQ/0r5UKAKIyyM:Nw9oM4jw4O65d

Malware Config

Targets

    • Target

      0692d0ca8901c88aaf87370429031adb_JaffaCakes118

    • Size

      944KB

    • MD5

      0692d0ca8901c88aaf87370429031adb

    • SHA1

      055ed12e164ff646fef3ce5a3d4ed2f80cba0eaa

    • SHA256

      1a2d782e38782327b176d295eaf860b844571d4b3521f8bc552a411bf4c1b27b

    • SHA512

      a644a5c7254f048a835d6e0f6f06b79ce6985c7f83014f603dc1cd8cd316118cda16b1c87be19c2afb3a5f68fc4160565a1c8a53dd83e3add06d02421cdfd00e

    • SSDEEP

      24576:MJYeZFzaJMVrWbPFi4zpKgQ/0r5UKAKIyyM:Nw9oM4jw4O65d

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks