General

  • Target

    1062674816d1c4ebd1f525b3b9169df7_JaffaCakes118

  • Size

    214KB

  • Sample

    241003-y4qq5aybma

  • MD5

    1062674816d1c4ebd1f525b3b9169df7

  • SHA1

    dd5146a20651c4c66a8378dd9aee35d99a3affc5

  • SHA256

    bd46e907615f068cbe6da3d0bba87ca4813693ebad01c6ad1030abb55780e645

  • SHA512

    03fb7e149c95c1515d2d12c70e7ae9bb62344179c0ef2c5586acd78856f51d7e39bcfb69f605a2df8c392098b13adf585eacc0c99ad42993bee4ec240d594948

  • SSDEEP

    6144:+WAG99MeInpZdSdwE3VQuXS8k/PucdiZ9Xn:PlMeIp6d93+2HoiDn

Malware Config

Targets

    • Target

      1062674816d1c4ebd1f525b3b9169df7_JaffaCakes118

    • Size

      214KB

    • MD5

      1062674816d1c4ebd1f525b3b9169df7

    • SHA1

      dd5146a20651c4c66a8378dd9aee35d99a3affc5

    • SHA256

      bd46e907615f068cbe6da3d0bba87ca4813693ebad01c6ad1030abb55780e645

    • SHA512

      03fb7e149c95c1515d2d12c70e7ae9bb62344179c0ef2c5586acd78856f51d7e39bcfb69f605a2df8c392098b13adf585eacc0c99ad42993bee4ec240d594948

    • SSDEEP

      6144:+WAG99MeInpZdSdwE3VQuXS8k/PucdiZ9Xn:PlMeIp6d93+2HoiDn

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks