General

  • Target

    2113f6ec5f174e363c20508ba20fe96a_JaffaCakes118

  • Size

    231KB

  • Sample

    241008-mmkyrsshlp

  • MD5

    2113f6ec5f174e363c20508ba20fe96a

  • SHA1

    6d548a53f9dcc79919e4fe492c540334ab814625

  • SHA256

    7373393f8dfa7f01ac42b42c92b33683489e99605bd2db2339aee7daa57924f6

  • SHA512

    929fb4855829499db5fd3ccd43458933a6a128cb37c6bfaa78adfcedf4e8e89e608252339385ff75f8d784bd33fbdd6cc722631854a13570aad28e2ce7ddf52e

  • SSDEEP

    6144:IJFW+7G1EjB6vPrsEjp13J1y4HArcy8e9:U6yE333r38

Malware Config

Targets

    • Target

      2113f6ec5f174e363c20508ba20fe96a_JaffaCakes118

    • Size

      231KB

    • MD5

      2113f6ec5f174e363c20508ba20fe96a

    • SHA1

      6d548a53f9dcc79919e4fe492c540334ab814625

    • SHA256

      7373393f8dfa7f01ac42b42c92b33683489e99605bd2db2339aee7daa57924f6

    • SHA512

      929fb4855829499db5fd3ccd43458933a6a128cb37c6bfaa78adfcedf4e8e89e608252339385ff75f8d784bd33fbdd6cc722631854a13570aad28e2ce7ddf52e

    • SSDEEP

      6144:IJFW+7G1EjB6vPrsEjp13J1y4HArcy8e9:U6yE333r38

    • Renames multiple (2548) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks