General

  • Target

    cba654cf359b8d6175303ac28d6c1bd5_JaffaCakes118

  • Size

    61KB

  • Sample

    241206-hr84ya1ncj

  • MD5

    cba654cf359b8d6175303ac28d6c1bd5

  • SHA1

    4ee1f00227c608083bf6f3a27d08e2a80da4472e

  • SHA256

    452122b0fe32b7ebf79cdc387378d6e5bdc65ef82e6b1c24f5e3a2b0e8ddfbe4

  • SHA512

    1307cda5755c056ce4b01c28a6b7d556bf302ea0829abd8c338bfe3fbcb51267d83f8eb2839d5f57eb8fdf3335a1841de0801b4a7cdf98e8a2fef9b12e7d250e

  • SSDEEP

    768:pKsMqCXfVcWlQM9ZkiANIULSYLDwUzc80gmq3oP/oD9:pKseSM9ZkiAPLr/0O8/o5

Malware Config

Targets

    • Target

      cba654cf359b8d6175303ac28d6c1bd5_JaffaCakes118

    • Size

      61KB

    • MD5

      cba654cf359b8d6175303ac28d6c1bd5

    • SHA1

      4ee1f00227c608083bf6f3a27d08e2a80da4472e

    • SHA256

      452122b0fe32b7ebf79cdc387378d6e5bdc65ef82e6b1c24f5e3a2b0e8ddfbe4

    • SHA512

      1307cda5755c056ce4b01c28a6b7d556bf302ea0829abd8c338bfe3fbcb51267d83f8eb2839d5f57eb8fdf3335a1841de0801b4a7cdf98e8a2fef9b12e7d250e

    • SSDEEP

      768:pKsMqCXfVcWlQM9ZkiANIULSYLDwUzc80gmq3oP/oD9:pKseSM9ZkiAPLr/0O8/o5

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Nitro family

    • Renames multiple (65) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks