General

  • Target

    1484a0ecf720d351f8897c2f9b3f5046_JaffaCakes118

  • Size

    61KB

  • Sample

    241004-xcqflsvaqe

  • MD5

    1484a0ecf720d351f8897c2f9b3f5046

  • SHA1

    8770a72054cc21f07051df2b4c0f7775cc4fa731

  • SHA256

    a00d950fbee25d407f79f5d7211cbd1f15d27f89bf5714e44f222c9013f6c131

  • SHA512

    136ef22f74ed55859bb143a26b2dbf1f4bb84c267d461e60d44934eb879a9efc4902e05dd386bb4926ea2cc469f8f7efe24ae6d6a4bb45511b4939558b379d97

  • SSDEEP

    768:iKsMqCXfVcWO/M9ZkiANIUhyIYLDwUzc80gmq3oP/oDn:iKseiM9ZkiAPhAr/0O8/o7

Malware Config

Targets

    • Target

      1484a0ecf720d351f8897c2f9b3f5046_JaffaCakes118

    • Size

      61KB

    • MD5

      1484a0ecf720d351f8897c2f9b3f5046

    • SHA1

      8770a72054cc21f07051df2b4c0f7775cc4fa731

    • SHA256

      a00d950fbee25d407f79f5d7211cbd1f15d27f89bf5714e44f222c9013f6c131

    • SHA512

      136ef22f74ed55859bb143a26b2dbf1f4bb84c267d461e60d44934eb879a9efc4902e05dd386bb4926ea2cc469f8f7efe24ae6d6a4bb45511b4939558b379d97

    • SSDEEP

      768:iKsMqCXfVcWO/M9ZkiANIUhyIYLDwUzc80gmq3oP/oDn:iKseiM9ZkiAPhAr/0O8/o7

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Renames multiple (72) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks