General

  • Target

    9098311a0769abc9228747193c020e94_JaffaCakes118

  • Size

    61KB

  • Sample

    241123-znt92swkbs

  • MD5

    9098311a0769abc9228747193c020e94

  • SHA1

    4b733c6389f552c15faf93de6a9e0217b6966759

  • SHA256

    1bb76ebb9babf91da73cc626184bd08aa4926ca2b5d9e6f10024e045bb5dbb9a

  • SHA512

    fdfbdc2c46bd0eab2ded6d884c7695fad82ccbcc7cd5d4747fa217f97e5514b88b8061451face07134c9b02bacc08880e5bc632b08d60c712c466c2f581547d2

  • SSDEEP

    768:IKsMqCXfVcWp3M9ZkiANIUfWYLDwUzc80gmq3oP/oD9:IKse1M9ZkiAPjr/0O8/o5

Malware Config

Targets

    • Target

      9098311a0769abc9228747193c020e94_JaffaCakes118

    • Size

      61KB

    • MD5

      9098311a0769abc9228747193c020e94

    • SHA1

      4b733c6389f552c15faf93de6a9e0217b6966759

    • SHA256

      1bb76ebb9babf91da73cc626184bd08aa4926ca2b5d9e6f10024e045bb5dbb9a

    • SHA512

      fdfbdc2c46bd0eab2ded6d884c7695fad82ccbcc7cd5d4747fa217f97e5514b88b8061451face07134c9b02bacc08880e5bc632b08d60c712c466c2f581547d2

    • SSDEEP

      768:IKsMqCXfVcWp3M9ZkiANIUfWYLDwUzc80gmq3oP/oD9:IKse1M9ZkiAPjr/0O8/o5

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Nitro family

    • Renames multiple (87) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks