General

  • Target

    a382153ad18d0c95006b5c4c197efca5_JaffaCakes118

  • Size

    61KB

  • Sample

    241126-xcyrzszqak

  • MD5

    a382153ad18d0c95006b5c4c197efca5

  • SHA1

    6f8b2a57b75d20c2c9707dfe8e3c0a2c8a1380c5

  • SHA256

    85de0898ff39ffa8fce097fa675551106ec38e47c93dfc8cd2d35f460a0d9eac

  • SHA512

    703eb3fc51ae49576d9055335af1495ed0b4d4c01b7c2ad5952dd127f882df21eb88d3c7bad4cea2478399b79c8485b13011324b88593c0517c7f0178f356e74

  • SSDEEP

    768:vnmqruBPuQDuKZBQA0KadVR2LDwUzc80gmq3oP/oDn:vncTpO74r/0O8/oD

Malware Config

Targets

    • Target

      a382153ad18d0c95006b5c4c197efca5_JaffaCakes118

    • Size

      61KB

    • MD5

      a382153ad18d0c95006b5c4c197efca5

    • SHA1

      6f8b2a57b75d20c2c9707dfe8e3c0a2c8a1380c5

    • SHA256

      85de0898ff39ffa8fce097fa675551106ec38e47c93dfc8cd2d35f460a0d9eac

    • SHA512

      703eb3fc51ae49576d9055335af1495ed0b4d4c01b7c2ad5952dd127f882df21eb88d3c7bad4cea2478399b79c8485b13011324b88593c0517c7f0178f356e74

    • SSDEEP

      768:vnmqruBPuQDuKZBQA0KadVR2LDwUzc80gmq3oP/oDn:vncTpO74r/0O8/oD

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Nitro family

    • Renames multiple (83) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks