General

  • Target

    JaffaCakes118_99f8d45504bc7a0b44dd1b1e9e140d20

  • Size

    981KB

  • Sample

    250108-l6892axpfr

  • MD5

    99f8d45504bc7a0b44dd1b1e9e140d20

  • SHA1

    d342f4bd98b3d0abe43d7efbf09563f95706f71b

  • SHA256

    1d78c999f43239d13a70f0ce1999562cd860518d67f5b5e408378182b2ec9241

  • SHA512

    1e9321e0a3268a7edc47250b6bca20d9a2acd5735862ecf68dbf37ee66e5ae4431c63faf824ffd0e19920f9a5cba29c2f916093233de605670b90fe7a76e8940

  • SSDEEP

    24576:grnXGG1qtW4BFOyIK1lC+7hvMVwT3dq+/QIt5F0Qm4kWiR+rvQWl:WnWx1OG1EKtM2T3mIPk4lioBl

Malware Config

Extracted

Family

growtopia

C2

https://discord.com/api/webhooks/899935404453679154/QoATNDrKaUHzsmnHBcpHhyCFen2GX-Fz5r8Bq4Z7cOyFFVKIKQuJT3E0OZR6tOLA-O3x

Attributes
  • payload_url

    https://cdn.discordapp.com/attachments/819331742212161576/877227264864055327/clipboard.gif

    https://cdn.discordapp.com/attachments/819331742212161576/877223646391844904/savedat.gif

Targets

    • Target

      JaffaCakes118_99f8d45504bc7a0b44dd1b1e9e140d20

    • Size

      981KB

    • MD5

      99f8d45504bc7a0b44dd1b1e9e140d20

    • SHA1

      d342f4bd98b3d0abe43d7efbf09563f95706f71b

    • SHA256

      1d78c999f43239d13a70f0ce1999562cd860518d67f5b5e408378182b2ec9241

    • SHA512

      1e9321e0a3268a7edc47250b6bca20d9a2acd5735862ecf68dbf37ee66e5ae4431c63faf824ffd0e19920f9a5cba29c2f916093233de605670b90fe7a76e8940

    • SSDEEP

      24576:grnXGG1qtW4BFOyIK1lC+7hvMVwT3dq+/QIt5F0Qm4kWiR+rvQWl:WnWx1OG1EKtM2T3mIPk4lioBl

    • Growtopia

      Growtopa is an opensource modular stealer written in C#.

    • Growtopia family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks