General

  • Target

    263a5b039dfd0c0e0394ffdfeb5ea34f_JaffaCakes118

  • Size

    852KB

  • Sample

    241008-141x7sscnr

  • MD5

    263a5b039dfd0c0e0394ffdfeb5ea34f

  • SHA1

    b4abd67bc61ded4f142c0a8b64d69cce8e7c8988

  • SHA256

    ae0f9096afd3723c22aed5d4385b1d2d86d3ccfbdcfcb7fb8ae4e97339eaf0c0

  • SHA512

    4ebd81fb7906c27bb9b4e6436e76d8ea609d66d8d78eee26145b20d5c1bade7c3816a4fb3c7a8d85cb106ec61acd4b3ff65132146ed48430979e9903317d76b6

  • SSDEEP

    24576:OrEEdQc9PH7XeERcOvjVyWTppvLU0jsiXDYHT:BEdn/7Xegj42TDiT

Malware Config

Targets

    • Target

      263a5b039dfd0c0e0394ffdfeb5ea34f_JaffaCakes118

    • Size

      852KB

    • MD5

      263a5b039dfd0c0e0394ffdfeb5ea34f

    • SHA1

      b4abd67bc61ded4f142c0a8b64d69cce8e7c8988

    • SHA256

      ae0f9096afd3723c22aed5d4385b1d2d86d3ccfbdcfcb7fb8ae4e97339eaf0c0

    • SHA512

      4ebd81fb7906c27bb9b4e6436e76d8ea609d66d8d78eee26145b20d5c1bade7c3816a4fb3c7a8d85cb106ec61acd4b3ff65132146ed48430979e9903317d76b6

    • SSDEEP

      24576:OrEEdQc9PH7XeERcOvjVyWTppvLU0jsiXDYHT:BEdn/7Xegj42TDiT

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks