General

  • Target

    d126b33d48f9e5da43cc648a8ca7f392_JaffaCakes118

  • Size

    61KB

  • Sample

    241207-hmy36sxjap

  • MD5

    d126b33d48f9e5da43cc648a8ca7f392

  • SHA1

    9755ca804a0fc3c1ebd05b8c5c53936c5f3aa915

  • SHA256

    c7dbba0767778f294d28e364de2a833d10e2b6b0a0b8477b10a5efe6436d349e

  • SHA512

    6dafd7466fbcfa9a3c7d88058741594685efd37da795578b2fc704ffb5719fa6a652d02509059d191c60dd52e697684748f9ddcd37e88d17db9dff4250523afc

  • SSDEEP

    768:NHc/dFw/P9UMW4IE3t8CVLDwUzc80gmq3oP/oDS:NQdFwPxIEC0r/0O8/oO

Malware Config

Targets

    • Target

      d126b33d48f9e5da43cc648a8ca7f392_JaffaCakes118

    • Size

      61KB

    • MD5

      d126b33d48f9e5da43cc648a8ca7f392

    • SHA1

      9755ca804a0fc3c1ebd05b8c5c53936c5f3aa915

    • SHA256

      c7dbba0767778f294d28e364de2a833d10e2b6b0a0b8477b10a5efe6436d349e

    • SHA512

      6dafd7466fbcfa9a3c7d88058741594685efd37da795578b2fc704ffb5719fa6a652d02509059d191c60dd52e697684748f9ddcd37e88d17db9dff4250523afc

    • SSDEEP

      768:NHc/dFw/P9UMW4IE3t8CVLDwUzc80gmq3oP/oDS:NQdFwPxIEC0r/0O8/oO

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Nitro family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks