General

  • Target

    1a7a4a3125c7e8b4570e015e918b3ea4_JaffaCakes118

  • Size

    361KB

  • Sample

    240701-jkbersshpn

  • MD5

    1a7a4a3125c7e8b4570e015e918b3ea4

  • SHA1

    6ef597ba7121d9e13702e0ebe333fb598f5afdcb

  • SHA256

    0fca35ebb7ae0f4fe1ea6566c78f15959f1599ecf6c58c3218f5a65118eaa4cb

  • SHA512

    88df0aa47e94efe2511ad174737e0612f8d5b1aadc55ab030d9f46d44eb5498e6d5815d12e129c762bce36669c7e103843a72e4b433848794494ef3de6ef0648

  • SSDEEP

    6144:NKDmydY+S9m2IsM56ZyXriQtAkaY9h4JewwdhTm77IEiwJJpI:SdY+kmf6Z+rjuk19KNYhTmAEiwbp

Malware Config

Targets

    • Target

      1a7a4a3125c7e8b4570e015e918b3ea4_JaffaCakes118

    • Size

      361KB

    • MD5

      1a7a4a3125c7e8b4570e015e918b3ea4

    • SHA1

      6ef597ba7121d9e13702e0ebe333fb598f5afdcb

    • SHA256

      0fca35ebb7ae0f4fe1ea6566c78f15959f1599ecf6c58c3218f5a65118eaa4cb

    • SHA512

      88df0aa47e94efe2511ad174737e0612f8d5b1aadc55ab030d9f46d44eb5498e6d5815d12e129c762bce36669c7e103843a72e4b433848794494ef3de6ef0648

    • SSDEEP

      6144:NKDmydY+S9m2IsM56ZyXriQtAkaY9h4JewwdhTm77IEiwJJpI:SdY+kmf6Z+rjuk19KNYhTmAEiwbp

    • UAC bypass

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

3
T1112

Credential Access

Unsecured Credentials

3
T1552

Credentials In Files

3
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks