General

  • Target

    JaffaCakes118_79b53b86991e5b293effb6faa90284fe

  • Size

    397KB

  • Sample

    250316-lbcmkszrz9

  • MD5

    79b53b86991e5b293effb6faa90284fe

  • SHA1

    9151154b037719cc2aa821b648f1c2331cefc7a6

  • SHA256

    9d9cacaa68b36a6f322d14f7e5329c199b28c35b4e9ca62cc8d30173886e6de5

  • SHA512

    e86bf2de2c8c0412ca5bde426311839c16a6b76306236e3cf205d3ec0385fdf0bfa6be26bf007be1a8af4fff6ae6b84154cf0541f671d114ad506b6da13c78e6

  • SSDEEP

    6144:Sf/YM7555/4zAaEpV3s6tdmtcwOixAkV94xtFwRH/KGjZCZDKvg:SfUfEpvuxxd94xvCfKICZDKo

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    Smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    myhackername

Targets

    • Target

      JaffaCakes118_79b53b86991e5b293effb6faa90284fe

    • Size

      397KB

    • MD5

      79b53b86991e5b293effb6faa90284fe

    • SHA1

      9151154b037719cc2aa821b648f1c2331cefc7a6

    • SHA256

      9d9cacaa68b36a6f322d14f7e5329c199b28c35b4e9ca62cc8d30173886e6de5

    • SHA512

      e86bf2de2c8c0412ca5bde426311839c16a6b76306236e3cf205d3ec0385fdf0bfa6be26bf007be1a8af4fff6ae6b84154cf0541f671d114ad506b6da13c78e6

    • SSDEEP

      6144:Sf/YM7555/4zAaEpV3s6tdmtcwOixAkV94xtFwRH/KGjZCZDKvg:SfUfEpvuxxd94xvCfKICZDKo

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks