General

  • Target

    JaffaCakes118_33755670455badf5c6826866db99c9ef

  • Size

    1.8MB

  • Sample

    250126-hyq7psvrcw

  • MD5

    33755670455badf5c6826866db99c9ef

  • SHA1

    3fe0d62b164a5cf3bcd3d9fb971172a1599d7205

  • SHA256

    8e952b9b081951b91be45d32e7b3c9ce3539d84f0f05b74e9733475c0c84627f

  • SHA512

    aa76df546525fbf52cc6f0e498437bc8edb6171641201ed42d339ca6009989c14eeaf7d14e076543caff42dc20b0ca808b8608c8b70f6a66b5e6a47cd9db2dfe

  • SSDEEP

    49152:YA7zo44O1fJwS7x3LN7PdwZ20VXv7NwLKjXMh2QbaSxdTTtay3BXhv:YAwdO/N3BlwZ20VjNwLKjXMIQbaSxdFd

Malware Config

Targets

    • Target

      JaffaCakes118_33755670455badf5c6826866db99c9ef

    • Size

      1.8MB

    • MD5

      33755670455badf5c6826866db99c9ef

    • SHA1

      3fe0d62b164a5cf3bcd3d9fb971172a1599d7205

    • SHA256

      8e952b9b081951b91be45d32e7b3c9ce3539d84f0f05b74e9733475c0c84627f

    • SHA512

      aa76df546525fbf52cc6f0e498437bc8edb6171641201ed42d339ca6009989c14eeaf7d14e076543caff42dc20b0ca808b8608c8b70f6a66b5e6a47cd9db2dfe

    • SSDEEP

      49152:YA7zo44O1fJwS7x3LN7PdwZ20VXv7NwLKjXMh2QbaSxdTTtay3BXhv:YAwdO/N3BlwZ20VjNwLKjXMIQbaSxdFd

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks