General

  • Target

    1a4d0f0002036b4c77841100a8e05f46_JaffaCakes118

  • Size

    61KB

  • Sample

    241006-3kte5awdrc

  • MD5

    1a4d0f0002036b4c77841100a8e05f46

  • SHA1

    a9733fe6b29bfa2aed64a4fc0d9eef7083252b84

  • SHA256

    dc464ff6c0a7512b6c2582f1539176f1eb409e603fecde8a3eb19661eaffe60d

  • SHA512

    7c2a166c5032b83cce37e007c380805f8f90f8fa0b35958c44b8cad349f61dabd8fe3d8f811a4e6fe33f09887401d4d0965eec4f3eb4237ea1d3af4c2e8d7ea5

  • SSDEEP

    768:BKsMqCXfVcWlQM9ZkiANIULTYLDwUzc80gmq3oP/oDE:BKseSM9ZkiAPgr/0O8/oo

Malware Config

Targets

    • Target

      1a4d0f0002036b4c77841100a8e05f46_JaffaCakes118

    • Size

      61KB

    • MD5

      1a4d0f0002036b4c77841100a8e05f46

    • SHA1

      a9733fe6b29bfa2aed64a4fc0d9eef7083252b84

    • SHA256

      dc464ff6c0a7512b6c2582f1539176f1eb409e603fecde8a3eb19661eaffe60d

    • SHA512

      7c2a166c5032b83cce37e007c380805f8f90f8fa0b35958c44b8cad349f61dabd8fe3d8f811a4e6fe33f09887401d4d0965eec4f3eb4237ea1d3af4c2e8d7ea5

    • SSDEEP

      768:BKsMqCXfVcWlQM9ZkiANIULTYLDwUzc80gmq3oP/oDE:BKseSM9ZkiAPgr/0O8/oo

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Renames multiple (85) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks