General

  • Target

    1e3623db60060f182ce3d37907e2350e_JaffaCakes118

  • Size

    60KB

  • Sample

    241007-2bqr7szelg

  • MD5

    1e3623db60060f182ce3d37907e2350e

  • SHA1

    b94c22c40c149b9265ec56f91f38ef080e5a5bfd

  • SHA256

    07b087b1e455c0efabcb704ba89195b9f3b0eaa81e232cafeca3c1822ed8ee91

  • SHA512

    51bbad2af84929de2e58a7fc187f5507c91590f8abcf1af146d975f353d185bdcafd573e64ae030eb9e459416d291d41701d5bfce508b20ceb776940cde68140

  • SSDEEP

    768:wOucKn7n1JGDNANIU+svLDwUzc80gmq3oP/oDjs:wO2GDNAPrr/0O8/oPs

Malware Config

Targets

    • Target

      1e3623db60060f182ce3d37907e2350e_JaffaCakes118

    • Size

      60KB

    • MD5

      1e3623db60060f182ce3d37907e2350e

    • SHA1

      b94c22c40c149b9265ec56f91f38ef080e5a5bfd

    • SHA256

      07b087b1e455c0efabcb704ba89195b9f3b0eaa81e232cafeca3c1822ed8ee91

    • SHA512

      51bbad2af84929de2e58a7fc187f5507c91590f8abcf1af146d975f353d185bdcafd573e64ae030eb9e459416d291d41701d5bfce508b20ceb776940cde68140

    • SSDEEP

      768:wOucKn7n1JGDNANIU+svLDwUzc80gmq3oP/oDjs:wO2GDNAPrr/0O8/oPs

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Renames multiple (113) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks