General

  • Target

    101b558457868065952e67ed8db39e07_JaffaCakes118

  • Size

    199KB

  • Sample

    241003-xcna9atgmf

  • MD5

    101b558457868065952e67ed8db39e07

  • SHA1

    dd1e73f1d4539abf7f70c6cae16d8466093cf99b

  • SHA256

    b6e7072f1cafe3fc7ddc0e2dbb1e40b997b3824d606572ead26c33fefb20f153

  • SHA512

    9e09d15a18c6d7ef8e4fbd754da3830ca6fa4f6ece1ed28594fa63622ad0fb66f80a2c45ad9f777a9d8b1680cf7a8c1266a3bf3963fd1f6a725b046c4140287f

  • SSDEEP

    3072:FJsyAT6sLPy3bY3ylNpFCJKZMlrREFwazl1V/ILnElcbTytIFuqlyyCfPH6Zxs/5:gyAT/D2Y3y/uSMxR4pbEA2ixpIf

Malware Config

Targets

    • Target

      101b558457868065952e67ed8db39e07_JaffaCakes118

    • Size

      199KB

    • MD5

      101b558457868065952e67ed8db39e07

    • SHA1

      dd1e73f1d4539abf7f70c6cae16d8466093cf99b

    • SHA256

      b6e7072f1cafe3fc7ddc0e2dbb1e40b997b3824d606572ead26c33fefb20f153

    • SHA512

      9e09d15a18c6d7ef8e4fbd754da3830ca6fa4f6ece1ed28594fa63622ad0fb66f80a2c45ad9f777a9d8b1680cf7a8c1266a3bf3963fd1f6a725b046c4140287f

    • SSDEEP

      3072:FJsyAT6sLPy3bY3ylNpFCJKZMlrREFwazl1V/ILnElcbTytIFuqlyyCfPH6Zxs/5:gyAT/D2Y3y/uSMxR4pbEA2ixpIf

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Renames multiple (94) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks