General

  • Target

    9f5707816aea4bbe395676187269a547_JaffaCakes118

  • Size

    60KB

  • Sample

    241126-c272qszkhz

  • MD5

    9f5707816aea4bbe395676187269a547

  • SHA1

    9aeedd62bd3f7c0a3501725c69b2493ac2f5ee13

  • SHA256

    8f9533aeee2064abb573e4d75b89b907e57d7d2fb7b2588fee88a903c2a7f735

  • SHA512

    e4a3c9566a1e6f093e698983ca5313aa5328e8fbbfd3cb59999372e2e06a8f9a7e531a5ebd3a924f228cbf5bc4d7270bbc91e877cf2b0b6f7333a497ae42a316

  • SSDEEP

    768:ROo9osCdarCuqEUoJIHDp8LDwUzc80gmq3oP/oDV:ROmGuqho4yr/0O8/oh

Malware Config

Targets

    • Target

      9f5707816aea4bbe395676187269a547_JaffaCakes118

    • Size

      60KB

    • MD5

      9f5707816aea4bbe395676187269a547

    • SHA1

      9aeedd62bd3f7c0a3501725c69b2493ac2f5ee13

    • SHA256

      8f9533aeee2064abb573e4d75b89b907e57d7d2fb7b2588fee88a903c2a7f735

    • SHA512

      e4a3c9566a1e6f093e698983ca5313aa5328e8fbbfd3cb59999372e2e06a8f9a7e531a5ebd3a924f228cbf5bc4d7270bbc91e877cf2b0b6f7333a497ae42a316

    • SSDEEP

      768:ROo9osCdarCuqEUoJIHDp8LDwUzc80gmq3oP/oDV:ROmGuqho4yr/0O8/oh

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Nitro family

    • Renames multiple (95) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks