General

  • Target

    22654f6edca4fa7ae849c29ec3955220_JaffaCakes118

  • Size

    363KB

  • Sample

    241008-tftewstgnm

  • MD5

    22654f6edca4fa7ae849c29ec3955220

  • SHA1

    1b661602e8b66b6bb5d5a0ee93218ca441ab8b7d

  • SHA256

    f2f6bbf28ec87f8dc44ab1fb91572f801d87c595c8a4aea4eac910c5403a7b33

  • SHA512

    036272db6818fbf28769ef8c1f4f2c888e54ec6cb98feb29eb85d19d452fd9a0abdff9b2a88b4ca0477a9148197e9a452c38a7ac9ca7dda97ce9455e1ac635d3

  • SSDEEP

    6144:HP0370mcFmY8bP2U623amIBL2PyCByJK/GTO8Xkr8NcXVcpvadgi3R8bDj71pT/u:FThU33aJBaP7aKr8XkoN0VLdSLTTC

Malware Config

Targets

    • Target

      magic dreams 2.2.exe

    • Size

      444KB

    • MD5

      6f244b6af648a073a70dec542b690dd9

    • SHA1

      ee4bf04d0cf7d45cceff486ccbdb6695cb1ad8cf

    • SHA256

      54e6d0a9e9cf45b389919490c1416e8d1cf2de27b5b3a96e53e78561ff48fd22

    • SHA512

      840d293d35a41a21e0224fd8603600762389d6b3eff31108fd72d0d023c31c6f079cd1fcf599acec5041338674ab4c538ca131f965ebb316c106d221b3d56bf7

    • SSDEEP

      12288:7q1q3C4c0C3jaJBaPHaKx8Xk8NxagaElleY:e1czc3Ywt8XzNxagaClz

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks