General

  • Target

    931727d01f632cad67329528d1ae411b_JaffaCakes118

  • Size

    62KB

  • Sample

    241124-hf5mdavkan

  • MD5

    931727d01f632cad67329528d1ae411b

  • SHA1

    9834a272c713b4de00ec6954d03c7931620e2804

  • SHA256

    0bbe7b85d022ac808df0589304f506c753768562d3b88561f5601bddc758d4c2

  • SHA512

    096ad4860945abcd9aead69589876fc50f187e8ce376d29d4166234260378a4d9afe8186bd170f92b88e1e3ea5e1d14aa78725f0f44021a1a8e9bf59e7a6ebbe

  • SSDEEP

    768:nnby9UTTGitqI7GNI4jimYLDwUzc80gmq3oP/oDr:nnbn97Gxjsr/0O8/o3

Malware Config

Targets

    • Target

      931727d01f632cad67329528d1ae411b_JaffaCakes118

    • Size

      62KB

    • MD5

      931727d01f632cad67329528d1ae411b

    • SHA1

      9834a272c713b4de00ec6954d03c7931620e2804

    • SHA256

      0bbe7b85d022ac808df0589304f506c753768562d3b88561f5601bddc758d4c2

    • SHA512

      096ad4860945abcd9aead69589876fc50f187e8ce376d29d4166234260378a4d9afe8186bd170f92b88e1e3ea5e1d14aa78725f0f44021a1a8e9bf59e7a6ebbe

    • SSDEEP

      768:nnby9UTTGitqI7GNI4jimYLDwUzc80gmq3oP/oDr:nnbn97Gxjsr/0O8/o3

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Nitro family

    • Renames multiple (70) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks