General

  • Target

    826bac4a36729fbd2cae710adcec5a60_JaffaCakes118

  • Size

    2.3MB

  • Sample

    241031-j4rk4avbmg

  • MD5

    826bac4a36729fbd2cae710adcec5a60

  • SHA1

    4fca69b9ce3d2dd835d8b823300ca9a50c44cff0

  • SHA256

    ec28a2158a01b865d15a95805eee56100061a9c5ad7262c078668016a7ff374b

  • SHA512

    1fe2cfe5fdf92b448ada02e20c4737760e19d938d33f541d114dfd447510cc45648a641b994ab3dc91f3782d61a28a832f4574e7041e78461ec211926acbefc0

  • SSDEEP

    49152:diXNYl1dnAUV3cfxPa5aHHW1vo5R8qa2Vb/jyR2hwrT4AV14T6fjCgfP+R3AxDgz:did/b2INT6fh+RwKlsY

Malware Config

Targets

    • Target

      826bac4a36729fbd2cae710adcec5a60_JaffaCakes118

    • Size

      2.3MB

    • MD5

      826bac4a36729fbd2cae710adcec5a60

    • SHA1

      4fca69b9ce3d2dd835d8b823300ca9a50c44cff0

    • SHA256

      ec28a2158a01b865d15a95805eee56100061a9c5ad7262c078668016a7ff374b

    • SHA512

      1fe2cfe5fdf92b448ada02e20c4737760e19d938d33f541d114dfd447510cc45648a641b994ab3dc91f3782d61a28a832f4574e7041e78461ec211926acbefc0

    • SSDEEP

      49152:diXNYl1dnAUV3cfxPa5aHHW1vo5R8qa2Vb/jyR2hwrT4AV14T6fjCgfP+R3AxDgz:did/b2INT6fh+RwKlsY

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks