General

  • Target

    ecb5faaf15a75e66857d0cdfe936c45e_JaffaCakes118

  • Size

    61KB

  • Sample

    241213-wljhzswpgv

  • MD5

    ecb5faaf15a75e66857d0cdfe936c45e

  • SHA1

    2a6b69c095963a76b29b78509d58f586a5c0ee68

  • SHA256

    6546f0638160cb590b4ead2401fb55d48e10b2ee1808ff0354fff52c9e2f62bf

  • SHA512

    bdbd9e290d443314b255b183610c4d7ab4fcd783d008f1506636ffe2163f749f0624426239e2f842b3308df84f103154d531f33503eae74a873c197651c25125

  • SSDEEP

    768:wKsMqCXfVcWMHM9ZkiANIUZBOYLDwUzc80gmq3oP/oDe:wKse0M9ZkiAPZ9r/0O8/oy

Malware Config

Targets

    • Target

      ecb5faaf15a75e66857d0cdfe936c45e_JaffaCakes118

    • Size

      61KB

    • MD5

      ecb5faaf15a75e66857d0cdfe936c45e

    • SHA1

      2a6b69c095963a76b29b78509d58f586a5c0ee68

    • SHA256

      6546f0638160cb590b4ead2401fb55d48e10b2ee1808ff0354fff52c9e2f62bf

    • SHA512

      bdbd9e290d443314b255b183610c4d7ab4fcd783d008f1506636ffe2163f749f0624426239e2f842b3308df84f103154d531f33503eae74a873c197651c25125

    • SSDEEP

      768:wKsMqCXfVcWMHM9ZkiANIUZBOYLDwUzc80gmq3oP/oDe:wKse0M9ZkiAPZ9r/0O8/oy

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Nitro family

    • Renames multiple (83) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks