General

  • Target

    9e79d3441d146ef7f110d2b905cba8cf_JaffaCakes118

  • Size

    482KB

  • Sample

    241125-289lks1qbz

  • MD5

    9e79d3441d146ef7f110d2b905cba8cf

  • SHA1

    e87be4453ff2633048f320d84516949e9083ab9b

  • SHA256

    b9021a61a930838cb57e624657895ea4331c05cd19c088f3d50c414c2166f5b3

  • SHA512

    3c7f93b3589655103eff20d5c3ef6872632b726817b76cc5327d91f3e8e0f898f8254938c8f1df5f16b21dcd535396a85a2f0f597519aee1f632d91307393f61

  • SSDEEP

    6144:+gi7FtqpirWL/W1P5X2LI6nt4CC278ru+Rfn9d7dbOBRjKUaCABz1qap0lJtDao:8FOiCLe7K3h2tOnjWC6hq+0vtDa

Malware Config

Targets

    • Target

      9e79d3441d146ef7f110d2b905cba8cf_JaffaCakes118

    • Size

      482KB

    • MD5

      9e79d3441d146ef7f110d2b905cba8cf

    • SHA1

      e87be4453ff2633048f320d84516949e9083ab9b

    • SHA256

      b9021a61a930838cb57e624657895ea4331c05cd19c088f3d50c414c2166f5b3

    • SHA512

      3c7f93b3589655103eff20d5c3ef6872632b726817b76cc5327d91f3e8e0f898f8254938c8f1df5f16b21dcd535396a85a2f0f597519aee1f632d91307393f61

    • SSDEEP

      6144:+gi7FtqpirWL/W1P5X2LI6nt4CC278ru+Rfn9d7dbOBRjKUaCABz1qap0lJtDao:8FOiCLe7K3h2tOnjWC6hq+0vtDa

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks