General

  • Target

    JaffaCakes118_664f5340efc9fd501c4303ea4491d537

  • Size

    220KB

  • Sample

    250102-tft2eszphl

  • MD5

    664f5340efc9fd501c4303ea4491d537

  • SHA1

    e094e74ef643e588b36345b9eaf0a6e600b30c6a

  • SHA256

    f6c78ce5691a44093dbd34c5514420d9a5a9991c11a9834c52d86e1bcff69ef8

  • SHA512

    797e97e806b3f5943828385a58b40f6af901e50852cb74b5c29af4b45cb0a4c66b6dab62af7d706b6a12a8ad0ed7287cd8df17c62d6abc54ec83f22bdae86159

  • SSDEEP

    6144:6TqPRbdIKCC0ef//uXltKc+LVsz9b8+JBJ:7dFeCXuLKcCVsz6

Malware Config

Targets

    • Target

      JaffaCakes118_664f5340efc9fd501c4303ea4491d537

    • Size

      220KB

    • MD5

      664f5340efc9fd501c4303ea4491d537

    • SHA1

      e094e74ef643e588b36345b9eaf0a6e600b30c6a

    • SHA256

      f6c78ce5691a44093dbd34c5514420d9a5a9991c11a9834c52d86e1bcff69ef8

    • SHA512

      797e97e806b3f5943828385a58b40f6af901e50852cb74b5c29af4b45cb0a4c66b6dab62af7d706b6a12a8ad0ed7287cd8df17c62d6abc54ec83f22bdae86159

    • SSDEEP

      6144:6TqPRbdIKCC0ef//uXltKc+LVsz9b8+JBJ:7dFeCXuLKcCVsz6

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks