General

  • Target

    28a0bcda107fb1e915b3ec7e066a6e29_JaffaCakes118

  • Size

    2.4MB

  • Sample

    241009-b588javaqe

  • MD5

    28a0bcda107fb1e915b3ec7e066a6e29

  • SHA1

    bd99449f74591310c782e71c882f38c4c3f39c0b

  • SHA256

    71ed926faa587e2474903f5c0bb521d4a25c0e7dee983de3ec3ca820b6608268

  • SHA512

    bc08c781b850b0f60ad39ff2ebbf5ce2c4d1049d073f059b2e50606e5f5982ccff1c6712af7bb9028cf023770d4271f98dca0f4039cc0e86ba3416364769bbac

  • SSDEEP

    49152:g7LpqPnAU0nJtOCsglhUDWA1/Y6jyq5r4Flw/HD5:G2+LFsfrdjB5Eg/t

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    monkeyarman

Targets

    • Target

      28a0bcda107fb1e915b3ec7e066a6e29_JaffaCakes118

    • Size

      2.4MB

    • MD5

      28a0bcda107fb1e915b3ec7e066a6e29

    • SHA1

      bd99449f74591310c782e71c882f38c4c3f39c0b

    • SHA256

      71ed926faa587e2474903f5c0bb521d4a25c0e7dee983de3ec3ca820b6608268

    • SHA512

      bc08c781b850b0f60ad39ff2ebbf5ce2c4d1049d073f059b2e50606e5f5982ccff1c6712af7bb9028cf023770d4271f98dca0f4039cc0e86ba3416364769bbac

    • SSDEEP

      49152:g7LpqPnAU0nJtOCsglhUDWA1/Y6jyq5r4Flw/HD5:G2+LFsfrdjB5Eg/t

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks