General

  • Target

    56ea49c7f8a7871aed8d7dd492cbb3a4_JaffaCakes118

  • Size

    3.3MB

  • Sample

    241018-mfeheavaqq

  • MD5

    56ea49c7f8a7871aed8d7dd492cbb3a4

  • SHA1

    3a4b8fc4008e7e2628b1d5d0a248501565f99a2d

  • SHA256

    b5948e3a2ee1c15809a412cd434072adf7426571b271d28c0956e53406e02e2c

  • SHA512

    ddecafe232a015ddf01845d41e30165d84f912993fdea3693dd3220ea47eb4745d40cad7423f2ff677972bef8c5def3b2a5e38ee2c3544a2cf8c6818d2d7bd3c

  • SSDEEP

    49152:TEpGdTjvfIxO75x5khN4RnKSQByFygIt2Utb+:H

Malware Config

Targets

    • Target

      56ea49c7f8a7871aed8d7dd492cbb3a4_JaffaCakes118

    • Size

      3.3MB

    • MD5

      56ea49c7f8a7871aed8d7dd492cbb3a4

    • SHA1

      3a4b8fc4008e7e2628b1d5d0a248501565f99a2d

    • SHA256

      b5948e3a2ee1c15809a412cd434072adf7426571b271d28c0956e53406e02e2c

    • SHA512

      ddecafe232a015ddf01845d41e30165d84f912993fdea3693dd3220ea47eb4745d40cad7423f2ff677972bef8c5def3b2a5e38ee2c3544a2cf8c6818d2d7bd3c

    • SSDEEP

      49152:TEpGdTjvfIxO75x5khN4RnKSQByFygIt2Utb+:H

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks