General

  • Target

    2ad0cffb368cbc3d1180a6d785bc57b3_JaffaCakes118

  • Size

    223KB

  • Sample

    241009-e3knyawgql

  • MD5

    2ad0cffb368cbc3d1180a6d785bc57b3

  • SHA1

    0e48e294b6438012774c9b4ad79da13194b80d2f

  • SHA256

    e1689068f88b6505b5ea37961b2de29a342806811d4a462f658cd3f7713df14c

  • SHA512

    3c462a9d7431a94677c64dd7c0693ab48e2c3ac2b508dd99c2e317bd6987046901155ac5e3af14714131c9557bf9b6e4cb8039d5fb3e61f6f9cb406b5990514f

  • SSDEEP

    6144:kIxRcHU0hCwjWRYuwBiMbua6CJY6y6Ucj9yakf:kMc16RYxBJuThyg

Malware Config

Targets

    • Target

      2ad0cffb368cbc3d1180a6d785bc57b3_JaffaCakes118

    • Size

      223KB

    • MD5

      2ad0cffb368cbc3d1180a6d785bc57b3

    • SHA1

      0e48e294b6438012774c9b4ad79da13194b80d2f

    • SHA256

      e1689068f88b6505b5ea37961b2de29a342806811d4a462f658cd3f7713df14c

    • SHA512

      3c462a9d7431a94677c64dd7c0693ab48e2c3ac2b508dd99c2e317bd6987046901155ac5e3af14714131c9557bf9b6e4cb8039d5fb3e61f6f9cb406b5990514f

    • SSDEEP

      6144:kIxRcHU0hCwjWRYuwBiMbua6CJY6y6Ucj9yakf:kMc16RYxBJuThyg

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks