General

  • Target

    92eea22c70cf0fe4116b1021e91eb373_JaffaCakes118

  • Size

    61KB

  • Sample

    241124-gr2jesxldx

  • MD5

    92eea22c70cf0fe4116b1021e91eb373

  • SHA1

    66b8c24be3b82ecbbebb5e5a70ddf746d212e16f

  • SHA256

    73d55d99c41e89daa8c9bd213d02974d89b53c3e5a0dcd5bbf0b99ff36424cac

  • SHA512

    b8d2b6bba4027bda2ac3ef09c346a1e8ee768afb990bcacbd860bbead42a420303814e4f4081a32b81f89085b53879f7ce888c864cf34654a7c066facb44d035

  • SSDEEP

    768:HKsMqCXfVcWO/M9ZkiANIUM+2YLDwUzc80gmq3oP/oDH:HKseiM9ZkiAPhr/0O8/oj

Malware Config

Targets

    • Target

      92eea22c70cf0fe4116b1021e91eb373_JaffaCakes118

    • Size

      61KB

    • MD5

      92eea22c70cf0fe4116b1021e91eb373

    • SHA1

      66b8c24be3b82ecbbebb5e5a70ddf746d212e16f

    • SHA256

      73d55d99c41e89daa8c9bd213d02974d89b53c3e5a0dcd5bbf0b99ff36424cac

    • SHA512

      b8d2b6bba4027bda2ac3ef09c346a1e8ee768afb990bcacbd860bbead42a420303814e4f4081a32b81f89085b53879f7ce888c864cf34654a7c066facb44d035

    • SSDEEP

      768:HKsMqCXfVcWO/M9ZkiANIUM+2YLDwUzc80gmq3oP/oDH:HKseiM9ZkiAPhr/0O8/oj

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Nitro family

    • Renames multiple (68) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks