General

  • Target

    28c6930ca323e61d91b92e4bb843d0bb_JaffaCakes118

  • Size

    61KB

  • Sample

    241009-cckvxawaka

  • MD5

    28c6930ca323e61d91b92e4bb843d0bb

  • SHA1

    a2699d09bc912dff2cce4f1ebb1ad5e5dc470cf9

  • SHA256

    33ee355f77eef2768f6f5e210f008eb78e396f4adc97f090124ced1100507679

  • SHA512

    c0c44664f5f6e717f9878776f443fd56cffe87db6bc96ad80a74483aa2bf04ebbe7506d5387e661c185260d04372ccf28f96770e8348199514060b9e452d456a

  • SSDEEP

    768:38ljT2GRLVbGQ8GcYxR8zD8LDwUzc80gmq3oP/oD0:38NxVD8GcYbr/0O8/oQ

Malware Config

Targets

    • Target

      28c6930ca323e61d91b92e4bb843d0bb_JaffaCakes118

    • Size

      61KB

    • MD5

      28c6930ca323e61d91b92e4bb843d0bb

    • SHA1

      a2699d09bc912dff2cce4f1ebb1ad5e5dc470cf9

    • SHA256

      33ee355f77eef2768f6f5e210f008eb78e396f4adc97f090124ced1100507679

    • SHA512

      c0c44664f5f6e717f9878776f443fd56cffe87db6bc96ad80a74483aa2bf04ebbe7506d5387e661c185260d04372ccf28f96770e8348199514060b9e452d456a

    • SSDEEP

      768:38ljT2GRLVbGQ8GcYxR8zD8LDwUzc80gmq3oP/oD0:38NxVD8GcYbr/0O8/oQ

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Renames multiple (70) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks