General

  • Target

    0a8f7774e2ad53ad4add3deb49b4feac_JaffaCakes118

  • Size

    60KB

  • Sample

    241002-n8mvxsvdqq

  • MD5

    0a8f7774e2ad53ad4add3deb49b4feac

  • SHA1

    98577cb3dade5d8e8108ba4b3ce9cb862e9e2576

  • SHA256

    99842bf8db6403f3ff467e932aa1b9830523d9b53f15ea2ea71710b30c7884f8

  • SHA512

    4a243c021124d3399159d6435a7fe88d00968e91a4508987bf1ca0f050dfa93cca14f1eb53dda134ee4dd0e622242e8a73faccd4ed598b56d063401c387d8be6

  • SSDEEP

    768:FOucKn7n1JwDNANIUMTvLDwUzc80gmq3oP/oDp:FO2wDNAPGr/0O8/o9

Malware Config

Targets

    • Target

      0a8f7774e2ad53ad4add3deb49b4feac_JaffaCakes118

    • Size

      60KB

    • MD5

      0a8f7774e2ad53ad4add3deb49b4feac

    • SHA1

      98577cb3dade5d8e8108ba4b3ce9cb862e9e2576

    • SHA256

      99842bf8db6403f3ff467e932aa1b9830523d9b53f15ea2ea71710b30c7884f8

    • SHA512

      4a243c021124d3399159d6435a7fe88d00968e91a4508987bf1ca0f050dfa93cca14f1eb53dda134ee4dd0e622242e8a73faccd4ed598b56d063401c387d8be6

    • SSDEEP

      768:FOucKn7n1JwDNANIUMTvLDwUzc80gmq3oP/oDp:FO2wDNAPGr/0O8/o9

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Renames multiple (84) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks