Resubmissions

20-12-2024 21:57

241220-1vd23svrbr 8

18-12-2024 19:52

241218-ylw57azrfn 10

18-12-2024 19:51

241218-ylabeszrek 3

18-12-2024 19:31

241218-x8fw2sypez 8

18-12-2024 19:27

241218-x6k3zsypaw 3

18-12-2024 19:27

241218-x54hyazlfn 3

General

  • Target

    fcd1cdfe358c3b7c95e10cf72dbf727f_JaffaCakes118

  • Size

    93KB

  • Sample

    241218-x8fw2sypez

  • MD5

    fcd1cdfe358c3b7c95e10cf72dbf727f

  • SHA1

    7c5c487471db6b1702085fd880a931a819baa264

  • SHA256

    d95ae7b09fc599fa5ef99c04131117f9b8f9432b3b4aa9cf8492535f8d71ceae

  • SHA512

    30ca7a429aa4b1b3a877c6b8b83e3f957c2cb5a7a06d2ad63e0be5e85ade27f0d3255d8c0c671150013c01546369052882f5db77997f3980148a8b7a3a47caa6

  • SSDEEP

    1536:UHedaEV1N3QjlwBgiZDASIKwJJYut9OLod6/d3Vb4fcXwWx+7oRW8pO+W/O:Kedai/3ywBgirIBL1qd3VbrXp+7ow+D

Malware Config

Targets

    • Target

      fcd1cdfe358c3b7c95e10cf72dbf727f_JaffaCakes118

    • Size

      93KB

    • MD5

      fcd1cdfe358c3b7c95e10cf72dbf727f

    • SHA1

      7c5c487471db6b1702085fd880a931a819baa264

    • SHA256

      d95ae7b09fc599fa5ef99c04131117f9b8f9432b3b4aa9cf8492535f8d71ceae

    • SHA512

      30ca7a429aa4b1b3a877c6b8b83e3f957c2cb5a7a06d2ad63e0be5e85ade27f0d3255d8c0c671150013c01546369052882f5db77997f3980148a8b7a3a47caa6

    • SSDEEP

      1536:UHedaEV1N3QjlwBgiZDASIKwJJYut9OLod6/d3Vb4fcXwWx+7oRW8pO+W/O:Kedai/3ywBgirIBL1qd3VbrXp+7ow+D

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: internetexplorer@11

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Password Policy Discovery

      Attempt to access detailed information about the password policy used within an enterprise network.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks