General

  • Target

    JaffaCakes118_c573154c3aa94b13e003e15294f1b678

  • Size

    965KB

  • Sample

    250119-mr5hzatphw

  • MD5

    c573154c3aa94b13e003e15294f1b678

  • SHA1

    907b90858d2b11c0f7dbad8a94c58d84ca36c121

  • SHA256

    4f2b9a4d17f82bfd0df5a6c673c5b6dc80a35aad479c45e64e6d8c4d90ff66f3

  • SHA512

    cbfed226424f6811bcbb15c229c5a4f84a4d13cc5890ccb8bc549e8cee993071f1cb130d14a7020a7be58369aae9d04424007efaf056aef117447247f2447a09

  • SSDEEP

    24576:TClSWrcN00XgsOvAjOg5qjQ3h4K6i8khaKY:The0XNjONu16+hFY

Malware Config

Targets

    • Target

      JaffaCakes118_c573154c3aa94b13e003e15294f1b678

    • Size

      965KB

    • MD5

      c573154c3aa94b13e003e15294f1b678

    • SHA1

      907b90858d2b11c0f7dbad8a94c58d84ca36c121

    • SHA256

      4f2b9a4d17f82bfd0df5a6c673c5b6dc80a35aad479c45e64e6d8c4d90ff66f3

    • SHA512

      cbfed226424f6811bcbb15c229c5a4f84a4d13cc5890ccb8bc549e8cee993071f1cb130d14a7020a7be58369aae9d04424007efaf056aef117447247f2447a09

    • SSDEEP

      24576:TClSWrcN00XgsOvAjOg5qjQ3h4K6i8khaKY:The0XNjONu16+hFY

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks