General

  • Target

    b0b4a31baec71ce5b10c101e0c36722a_JaffaCakes118

  • Size

    880KB

  • Sample

    241129-mqvx5s1kf1

  • MD5

    b0b4a31baec71ce5b10c101e0c36722a

  • SHA1

    3ad836b254a500650440c9b0557e4d101575c3a0

  • SHA256

    dff80bb0b94b9e7a84bdaafc7ea8121e11ff805473d999b7d240ad84a658e5e7

  • SHA512

    03070c0eede5587ab134b6a32069de700409375282919635fc410e6dbd38bd54257b1f9c5107ff774b98f3d98d82b82a8dc7b5b4286c3ed4ae09854fa977e9e1

  • SSDEEP

    12288:Dqb7NgVNztGr7TkG1XXkWZ0H/AfF7GiMss2n0R6Q1fhXLDgjzxJ5qruHqImJBiyZ:mCNE3D5JqH/Y8iMo0kAfhXnyiupwBi

Malware Config

Targets

    • Target

      b0b4a31baec71ce5b10c101e0c36722a_JaffaCakes118

    • Size

      880KB

    • MD5

      b0b4a31baec71ce5b10c101e0c36722a

    • SHA1

      3ad836b254a500650440c9b0557e4d101575c3a0

    • SHA256

      dff80bb0b94b9e7a84bdaafc7ea8121e11ff805473d999b7d240ad84a658e5e7

    • SHA512

      03070c0eede5587ab134b6a32069de700409375282919635fc410e6dbd38bd54257b1f9c5107ff774b98f3d98d82b82a8dc7b5b4286c3ed4ae09854fa977e9e1

    • SSDEEP

      12288:Dqb7NgVNztGr7TkG1XXkWZ0H/AfF7GiMss2n0R6Q1fhXLDgjzxJ5qruHqImJBiyZ:mCNE3D5JqH/Y8iMo0kAfhXnyiupwBi

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks