General

  • Target

    be3ac0bfb0f67a227a8d21e6f5dd2e8a_JaffaCakes118

  • Size

    212KB

  • Sample

    241203-tvn4qaylhp

  • MD5

    be3ac0bfb0f67a227a8d21e6f5dd2e8a

  • SHA1

    004ce61c3d23149b4ef7c76f92915cc294838673

  • SHA256

    ce290b7c291b303eec29b159d6995d654597c46657487d055875f22fde8dd0d0

  • SHA512

    3b12d0f0eceb8a45aebdceb91fc90c0b99d76668a76cad54fbd3a9aa32fd425098593ad6f233a527626e48fbaa2139c8d0ab0d2033b430bbb9a71818f616cd79

  • SSDEEP

    3072:FR2+HnrxtHxn2bRwuIPvEoWTJEIxVn3x42JlBpRD7+argroCDhbSktAE35vhYtvr:T2+ttRnUG5veEIx1y2JPnDaGeJeQ5qu2

Malware Config

Targets

    • Target

      be3ac0bfb0f67a227a8d21e6f5dd2e8a_JaffaCakes118

    • Size

      212KB

    • MD5

      be3ac0bfb0f67a227a8d21e6f5dd2e8a

    • SHA1

      004ce61c3d23149b4ef7c76f92915cc294838673

    • SHA256

      ce290b7c291b303eec29b159d6995d654597c46657487d055875f22fde8dd0d0

    • SHA512

      3b12d0f0eceb8a45aebdceb91fc90c0b99d76668a76cad54fbd3a9aa32fd425098593ad6f233a527626e48fbaa2139c8d0ab0d2033b430bbb9a71818f616cd79

    • SSDEEP

      3072:FR2+HnrxtHxn2bRwuIPvEoWTJEIxVn3x42JlBpRD7+argroCDhbSktAE35vhYtvr:T2+ttRnUG5veEIx1y2JPnDaGeJeQ5qu2

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks