General

  • Target

    9eb71e5d0d58d3b454e88bf58bb8553b_JaffaCakes118

  • Size

    2.2MB

  • Sample

    241126-agrg5szral

  • MD5

    9eb71e5d0d58d3b454e88bf58bb8553b

  • SHA1

    5d4ee9daa02e0e0152a583ee9dcd488c151e4800

  • SHA256

    3f85f13eb1e75a7ca07a06707af2a69d2d534734be2b98cd951bdbbc4b1a38c7

  • SHA512

    bb74c65949fea86767c900cf242955175a348d555c671b8584f2f9967637aa34c8b7945c1504e56a320147cae22b37e21eac0ec872b134305c5930d577a9e826

  • SSDEEP

    49152:igVHF/hLAkvUG0M7tRUlCnlSNPMzEvmhzQ9QJmqpcg5INw/8hPBTLF3:ighLAybDRXY0zQS7crNdhPL3

Malware Config

Targets

    • Target

      9eb71e5d0d58d3b454e88bf58bb8553b_JaffaCakes118

    • Size

      2.2MB

    • MD5

      9eb71e5d0d58d3b454e88bf58bb8553b

    • SHA1

      5d4ee9daa02e0e0152a583ee9dcd488c151e4800

    • SHA256

      3f85f13eb1e75a7ca07a06707af2a69d2d534734be2b98cd951bdbbc4b1a38c7

    • SHA512

      bb74c65949fea86767c900cf242955175a348d555c671b8584f2f9967637aa34c8b7945c1504e56a320147cae22b37e21eac0ec872b134305c5930d577a9e826

    • SSDEEP

      49152:igVHF/hLAkvUG0M7tRUlCnlSNPMzEvmhzQ9QJmqpcg5INw/8hPBTLF3:ighLAybDRXY0zQS7crNdhPL3

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Nitro family

    • Renames multiple (78) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks