General

  • Target

    97d8e6f4f1b8eb550dc3bddbb248b517_JaffaCakes118

  • Size

    61KB

  • Sample

    241124-3hd8es1phk

  • MD5

    97d8e6f4f1b8eb550dc3bddbb248b517

  • SHA1

    3f86d5392f592da72adfbddd00114dd5c84402d7

  • SHA256

    7e9a5036fe2c20513b4fc397b1c0a4ef51377cc88b462f42650a14c953a16bd6

  • SHA512

    05ce0112445c4ae61abb48e21ad4bafb3fe38f6b6d0fab9bf6d1ec56f2e4bdcdbee594e1ac00670421e3cbd4bbcd27fbec6971384102376999f5d94074a57950

  • SSDEEP

    768:xKsMqCXfVcWO/M9ZkiANIUyyYLDwUzc80gmq3oP/oDw:xKseiM9ZkiAP2r/0O8/oE

Malware Config

Targets

    • Target

      97d8e6f4f1b8eb550dc3bddbb248b517_JaffaCakes118

    • Size

      61KB

    • MD5

      97d8e6f4f1b8eb550dc3bddbb248b517

    • SHA1

      3f86d5392f592da72adfbddd00114dd5c84402d7

    • SHA256

      7e9a5036fe2c20513b4fc397b1c0a4ef51377cc88b462f42650a14c953a16bd6

    • SHA512

      05ce0112445c4ae61abb48e21ad4bafb3fe38f6b6d0fab9bf6d1ec56f2e4bdcdbee594e1ac00670421e3cbd4bbcd27fbec6971384102376999f5d94074a57950

    • SSDEEP

      768:xKsMqCXfVcWO/M9ZkiANIUyyYLDwUzc80gmq3oP/oDw:xKseiM9ZkiAP2r/0O8/oE

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Nitro family

    • Renames multiple (93) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks