General

  • Target

    5366df0bb74faf986aa910f3928c07f1_JaffaCakes118

  • Size

    1.3MB

  • Sample

    241017-yhk9hssglb

  • MD5

    5366df0bb74faf986aa910f3928c07f1

  • SHA1

    21690bfc33411d90d83f796901a71b830e8749a6

  • SHA256

    71ba9ee026ec77c443c097bc14858a5e42c1e5c58394d311ee5d41930f65540d

  • SHA512

    b648ec2077d697b4375a4c28a4b8e3df07b1d6585cdee28e006aceb40a8988c2a99178b4d757c8cac76b67ae992db53e6a517079fe8b739069b02c339f4891f5

  • SSDEEP

    24576:MIh9UUZ8Tw0UpK4M5vzuei/bc6EGn5u5TtyJ8adjCzjyhhcDkPQcKiwMH5yUKc59:MIjUUKTl4MJzur/bc6/nRJ/aOheDkPQe

Malware Config

Targets

    • Target

      5366df0bb74faf986aa910f3928c07f1_JaffaCakes118

    • Size

      1.3MB

    • MD5

      5366df0bb74faf986aa910f3928c07f1

    • SHA1

      21690bfc33411d90d83f796901a71b830e8749a6

    • SHA256

      71ba9ee026ec77c443c097bc14858a5e42c1e5c58394d311ee5d41930f65540d

    • SHA512

      b648ec2077d697b4375a4c28a4b8e3df07b1d6585cdee28e006aceb40a8988c2a99178b4d757c8cac76b67ae992db53e6a517079fe8b739069b02c339f4891f5

    • SSDEEP

      24576:MIh9UUZ8Tw0UpK4M5vzuei/bc6EGn5u5TtyJ8adjCzjyhhcDkPQcKiwMH5yUKc59:MIjUUKTl4MJzur/bc6/nRJ/aOheDkPQe

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks