General

  • Target

    0696c82189a158c90cd7380c1364d7bd_JaffaCakes118

  • Size

    1.4MB

  • Sample

    241001-t99c7szdnl

  • MD5

    0696c82189a158c90cd7380c1364d7bd

  • SHA1

    14d0f93143edb517ac7ca8df1ecd01b35c7bf4f6

  • SHA256

    0a680129c50765255e1db8984f21d5aeafdb5d6354d231824beb058581069aee

  • SHA512

    ea0ede088eb5512fbe54b46f891200bd2b74e18b9de5b85756a2e5cc2d2b6d8acb1095128c1759d22789bb4709f0647db67a01e2cebee4e1be89b33f9edf9a67

  • SSDEEP

    24576:TrRHwrLb10JbyNWAF5PNB+ps/lsfPBeymYVy2P7jVgnaE7/RzpNj/QufidUT:H5ObrLPNB0VAYVT7saE75zbY+t

Malware Config

Targets

    • Target

      0696c82189a158c90cd7380c1364d7bd_JaffaCakes118

    • Size

      1.4MB

    • MD5

      0696c82189a158c90cd7380c1364d7bd

    • SHA1

      14d0f93143edb517ac7ca8df1ecd01b35c7bf4f6

    • SHA256

      0a680129c50765255e1db8984f21d5aeafdb5d6354d231824beb058581069aee

    • SHA512

      ea0ede088eb5512fbe54b46f891200bd2b74e18b9de5b85756a2e5cc2d2b6d8acb1095128c1759d22789bb4709f0647db67a01e2cebee4e1be89b33f9edf9a67

    • SSDEEP

      24576:TrRHwrLb10JbyNWAF5PNB+ps/lsfPBeymYVy2P7jVgnaE7/RzpNj/QufidUT:H5ObrLPNB0VAYVT7saE75zbY+t

    • Event Triggered Execution: Image File Execution Options Injection

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks