General

  • Target

    227a73d24f797b6ddc724f54992f05ce_JaffaCakes118

  • Size

    64KB

  • Sample

    241008-tsglvsyarh

  • MD5

    227a73d24f797b6ddc724f54992f05ce

  • SHA1

    05d43fa2e84bfbf14e74256b65f3070fdf640e02

  • SHA256

    13c62078b17609a57ecdf9c64e3f16fcfdac866ca58c7929326a260ccdef76b6

  • SHA512

    98916906eab6e5ed98f494c2a522c254992f7849b7324bd176e44812118dd9fd2c1c86e59930b7f645410aa72827041ff6adb3988762a78349ae8dc3dfee770c

  • SSDEEP

    768:UiXcvIVLDwUzc8Ugmq3oP/oDzayoiT8WldZtUn3Ahui:UQr/UO8/oCTmVl1U8ui

Malware Config

Targets

    • Target

      227a73d24f797b6ddc724f54992f05ce_JaffaCakes118

    • Size

      64KB

    • MD5

      227a73d24f797b6ddc724f54992f05ce

    • SHA1

      05d43fa2e84bfbf14e74256b65f3070fdf640e02

    • SHA256

      13c62078b17609a57ecdf9c64e3f16fcfdac866ca58c7929326a260ccdef76b6

    • SHA512

      98916906eab6e5ed98f494c2a522c254992f7849b7324bd176e44812118dd9fd2c1c86e59930b7f645410aa72827041ff6adb3988762a78349ae8dc3dfee770c

    • SSDEEP

      768:UiXcvIVLDwUzc8Ugmq3oP/oDzayoiT8WldZtUn3Ahui:UQr/UO8/oCTmVl1U8ui

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Renames multiple (65) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks