General

  • Target

    JaffaCakes118_e299b34254104f3f89762b2ea86529e1

  • Size

    800KB

  • Sample

    250120-k5xn6ssjc1

  • MD5

    e299b34254104f3f89762b2ea86529e1

  • SHA1

    dc868d1cea66b9899aebb1381c58d038a881a63f

  • SHA256

    12b420bea010ab6306ff55303176953c9e85cde1213816eadd57a570a2d00e05

  • SHA512

    b8da4baaef78559fcf74b1b855adc804ac1eec9fdb16cd3bc3c2cd99411f4b3c5e9d9e92e68a227b723f13161969d57ce9b87d2560cd7f80400da413e3ddbbcb

  • SSDEEP

    24576:nEgaXPNT2QcLPmh4AURfjxuJyxouFdDEkTbSR:ngXlSQc7mh4RZxJWuzDEkXe

Malware Config

Targets

    • Target

      JaffaCakes118_e299b34254104f3f89762b2ea86529e1

    • Size

      800KB

    • MD5

      e299b34254104f3f89762b2ea86529e1

    • SHA1

      dc868d1cea66b9899aebb1381c58d038a881a63f

    • SHA256

      12b420bea010ab6306ff55303176953c9e85cde1213816eadd57a570a2d00e05

    • SHA512

      b8da4baaef78559fcf74b1b855adc804ac1eec9fdb16cd3bc3c2cd99411f4b3c5e9d9e92e68a227b723f13161969d57ce9b87d2560cd7f80400da413e3ddbbcb

    • SSDEEP

      24576:nEgaXPNT2QcLPmh4AURfjxuJyxouFdDEkTbSR:ngXlSQc7mh4RZxJWuzDEkXe

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks