General

  • Target

    b0bcf19827ffbdf58347f12878707bff_JaffaCakes118

  • Size

    342KB

  • Sample

    241129-mtqgts1lhv

  • MD5

    b0bcf19827ffbdf58347f12878707bff

  • SHA1

    1113438386f4d9049e6678bd176fd6c7119658f3

  • SHA256

    b5c72c6e9e8d3477dbd97fee514348dc61cc9aad832d33dacb52f1fc86c48768

  • SHA512

    c53c1489f62f6ecd11ea66318760da618fdb4d6c972dbc98347e35de30885955c36a031d6ddf0c6e39de6567c85f65b46299bbee30a81bae0810396bd80e88ec

  • SSDEEP

    6144:J/x73bXTzTvxGz6bnIKoYVCxeVnDYPrcDhMrCPaiUjasX:9v+YVCc+aMuRsX

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.drivehq.com
  • Port:
    21
  • Username:
    username

Targets

    • Target

      b0bcf19827ffbdf58347f12878707bff_JaffaCakes118

    • Size

      342KB

    • MD5

      b0bcf19827ffbdf58347f12878707bff

    • SHA1

      1113438386f4d9049e6678bd176fd6c7119658f3

    • SHA256

      b5c72c6e9e8d3477dbd97fee514348dc61cc9aad832d33dacb52f1fc86c48768

    • SHA512

      c53c1489f62f6ecd11ea66318760da618fdb4d6c972dbc98347e35de30885955c36a031d6ddf0c6e39de6567c85f65b46299bbee30a81bae0810396bd80e88ec

    • SSDEEP

      6144:J/x73bXTzTvxGz6bnIKoYVCxeVnDYPrcDhMrCPaiUjasX:9v+YVCc+aMuRsX

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Deletes itself

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks