General

  • Target

    8e6c0da213c278e63ae692a8dafe15e9_JaffaCakes118

  • Size

    60KB

  • Sample

    241104-blh71aslcj

  • MD5

    8e6c0da213c278e63ae692a8dafe15e9

  • SHA1

    f8e74cbbb667e0d60699e7b19ce4b688a468f082

  • SHA256

    602908a365ea6602535c825d2b7423ecb4a4ce5597b3114be289794a7a54d7ca

  • SHA512

    09d7d811aa5d1bf9414417bc6cd5e45758ca0e47e172e8b8c65c16e390d6641a5b59dcb01737425ce840075e81da382cea744bcde185070a862164de92fae3f1

  • SSDEEP

    768:POucKn7n1JGDNANIUqLyovLDwUzc80gmq3oP/oDas:PO2GDNAPquer/0O8/oF

Malware Config

Targets

    • Target

      8e6c0da213c278e63ae692a8dafe15e9_JaffaCakes118

    • Size

      60KB

    • MD5

      8e6c0da213c278e63ae692a8dafe15e9

    • SHA1

      f8e74cbbb667e0d60699e7b19ce4b688a468f082

    • SHA256

      602908a365ea6602535c825d2b7423ecb4a4ce5597b3114be289794a7a54d7ca

    • SHA512

      09d7d811aa5d1bf9414417bc6cd5e45758ca0e47e172e8b8c65c16e390d6641a5b59dcb01737425ce840075e81da382cea744bcde185070a862164de92fae3f1

    • SSDEEP

      768:POucKn7n1JGDNANIUqLyovLDwUzc80gmq3oP/oDas:PO2GDNAPquer/0O8/oF

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Nitro family

    • Renames multiple (96) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks