General

  • Target

    60a032fe8fd5a04cfafab8a8fa869a29_JaffaCakes118

  • Size

    60KB

  • Sample

    241020-gb7qhasaje

  • MD5

    60a032fe8fd5a04cfafab8a8fa869a29

  • SHA1

    4436375a70a009db43a83d3391bdd7cee0c687e5

  • SHA256

    4ba38b73e35c692b444708f34b41b6261644c3d6851a310918f0045878d795ac

  • SHA512

    6858803d823f5e777e843bfa172627389286f8d912d441a7edaf30d78e3a80ce12aac5b227ce583432aba754af80ec6f1a0cc8787861996934dba30b3572c99d

  • SSDEEP

    768:/OucKn7n1JpDLANIULK9LDwUzc80gmq3oP/oDo:/O2pDLAPIr/0O8/oU

Malware Config

Targets

    • Target

      60a032fe8fd5a04cfafab8a8fa869a29_JaffaCakes118

    • Size

      60KB

    • MD5

      60a032fe8fd5a04cfafab8a8fa869a29

    • SHA1

      4436375a70a009db43a83d3391bdd7cee0c687e5

    • SHA256

      4ba38b73e35c692b444708f34b41b6261644c3d6851a310918f0045878d795ac

    • SHA512

      6858803d823f5e777e843bfa172627389286f8d912d441a7edaf30d78e3a80ce12aac5b227ce583432aba754af80ec6f1a0cc8787861996934dba30b3572c99d

    • SSDEEP

      768:/OucKn7n1JpDLANIULK9LDwUzc80gmq3oP/oDo:/O2pDLAPIr/0O8/oU

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Renames multiple (70) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks