General

  • Target

    JaffaCakes118_9a5e537d9eea6f0e26eedc68fa240ec4

  • Size

    158KB

  • Sample

    250401-vhsf2sswcw

  • MD5

    9a5e537d9eea6f0e26eedc68fa240ec4

  • SHA1

    892cc8474e42eaf3094d11e8f302ed7cdb5162ad

  • SHA256

    d11d6f31d9a4924d3343cbea0d4a6bdb6d75ba51b5da7bd26e08faa43fa9fce1

  • SHA512

    2edc80de6b3cb310c8bdacb2f7b484ea40df8f0c0d5b747da2cab7aee0fc7a5647eb702c02cc257dc6a8f908f06c84ad81161dd594abf5dc375b043a39192856

  • SSDEEP

    3072:kRnLy8MWmJoOqteZmhVa32ippS3XrGY0OSSuP6mX7vv/ohiLlu9JR8:kp7OqvV+2ippSHrG7jt6CH/ohD6

Malware Config

Targets

    • Target

      JaffaCakes118_9a5e537d9eea6f0e26eedc68fa240ec4

    • Size

      158KB

    • MD5

      9a5e537d9eea6f0e26eedc68fa240ec4

    • SHA1

      892cc8474e42eaf3094d11e8f302ed7cdb5162ad

    • SHA256

      d11d6f31d9a4924d3343cbea0d4a6bdb6d75ba51b5da7bd26e08faa43fa9fce1

    • SHA512

      2edc80de6b3cb310c8bdacb2f7b484ea40df8f0c0d5b747da2cab7aee0fc7a5647eb702c02cc257dc6a8f908f06c84ad81161dd594abf5dc375b043a39192856

    • SSDEEP

      3072:kRnLy8MWmJoOqteZmhVa32ippS3XrGY0OSSuP6mX7vv/ohiLlu9JR8:kp7OqvV+2ippSHrG7jt6CH/ohD6

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Target

      $PLUGINSDIR/NSISdl.dll

    • Size

      14KB

    • MD5

      a5b84d250794433db5a2d26f34699dd9

    • SHA1

      bc06abccf6a4783973ec11b6766b43b4a265820c

    • SHA256

      96f3357a024c549d7cb9e6447b1a56a2a8029b4f12e6e597428e68620761c5e0

    • SHA512

      121d67f85a24096799ed913dccb64ef65d9479f98a6d88c2a0e05f05a65f460d557c5fdfe2c42a0a61b9cbaedd9b7031978111a2713250a89848ab4f3bb4ce84

    • SSDEEP

      192:/4lsN55M8r67wmsvJI5a299sfoG8I+WhPB3RY+h/G3DNl/qYcVp/12FgszA:/ysdM80dCI5a2LsQ5IlPNRY00AlAbU

    Score
    3/10
    • Target

      $PLUGINSDIR/System.dll

    • Size

      10KB

    • MD5

      7d85b1f619a3023cc693a88f040826d2

    • SHA1

      09f5d32f8143e7e0d9270430708db1b9fc8871a8

    • SHA256

      dc198967b0fb2bc7aaab0886a700c7f4d8cb346c4f9d48b9b220487b0dfe8a18

    • SHA512

      5465804c56d6251bf369609e1b44207b717228a8ac36c7992470b9daf4a231256c0ce95e0b027c4164e62d9656742a56e2b51e9347c8b17ab51ff40f32928c85

    • SSDEEP

      192:IDO6dJA/ruAFEiUdWWE6hE5RYUdJfbub1afgMO:TKAFERdlxhGRYUzqZaf

    Score
    3/10
    • Target

      $PROGRAMFILES/$0/Uninstall.exe

    • Size

      39KB

    • MD5

      b00d9555beebee772ff76df77cee661c

    • SHA1

      7d0c978469a6eed6259f6fdb274ecdab738c809d

    • SHA256

      566ab6e2b892c0a95e9957df7bfae01971daaecb95cfc254dfdac956ada8cdc1

    • SHA512

      832d95c3983e0db2c87581f9f5bdb73080fa78d56f6e00c46e1ae6fd5c70a0f2a48a0f3eb91d184baeb7eb3a47580f67aafe769dee37bcd90f0c24a6fcead1be

    • SSDEEP

      768:r/gUpAudwtjpQaCyMRiNH/buv1dTm61pF/O71mJEbOTVbcDoCdii:kUiudwBp3CyM8HsWmJ4OTVQBdii

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Target

      cmtowgosvx.exe

    • Size

      148KB

    • MD5

      a629b217630fbf5212b8fb8dbc387a81

    • SHA1

      b65e9b0e2d2de421d112e2ef7a56b720f3d4caab

    • SHA256

      01b736b2f0dd653d7103e68e7d9c1dbb34778ac0a71754c24f9f6094fc4d5558

    • SHA512

      28a53d8ea9c31627e474f77d71d4561136f11e8de233012f6557a6ed80dae4b0aabbf1a7d5fd9ac93b44c62aec1b0cd1e759d668b7d8f5f88f8e12ee13acf0a6

    • SSDEEP

      3072:Pewb17+Wrc7YDMhQW80elduieTXgano4:mwt+lcDIQWLnVno

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Target

      imex.bat

    • Size

      100B

    • MD5

      662f48a1d7bbabb99de8b51e2465c9b8

    • SHA1

      fe31c2868143478f539fba398de93dfe93d2e82a

    • SHA256

      28f86e44da62a09ce91f8adec29263a667a50a2520a9134c09f669a6c2ef84c2

    • SHA512

      a1b2b8ea9dc6f0a262f81cc80f52b2d2066ae9443c89759c8c1792020d933974e887ba343d861fd214170cd3227290c5da8ccad873e899ee5ca209b997fdbaff

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks