General

  • Target

    1ac047159ae15480b88b41f69e8d3ee5_JaffaCakes118

  • Size

    50KB

  • Sample

    240701-lb7gystcna

  • MD5

    1ac047159ae15480b88b41f69e8d3ee5

  • SHA1

    8ccdee24418081f2dcd1429ce7c4d4dba0d7e42f

  • SHA256

    0b39d040f8f48ac65ee300cbb86c0d23889f6a1bc1c00e37d51f9bd54cf8d8a5

  • SHA512

    d91ea298d8522f831281fdbf7c3da4189497acf0e859ad1a700c632590a9ee9604e11e8a92d11ea8ebb1898e4b206c3a81d92ff0a25c3aadad49a46fe7bebaea

  • SSDEEP

    768:MkpLA8BtBV0QJcW5wqInmNSfyvwx+BKXCJW+trdvsWCJn66kvOR:hkQJcqwmIfj+ECJG/kvO

Malware Config

Targets

    • Target

      1ac047159ae15480b88b41f69e8d3ee5_JaffaCakes118

    • Size

      50KB

    • MD5

      1ac047159ae15480b88b41f69e8d3ee5

    • SHA1

      8ccdee24418081f2dcd1429ce7c4d4dba0d7e42f

    • SHA256

      0b39d040f8f48ac65ee300cbb86c0d23889f6a1bc1c00e37d51f9bd54cf8d8a5

    • SHA512

      d91ea298d8522f831281fdbf7c3da4189497acf0e859ad1a700c632590a9ee9604e11e8a92d11ea8ebb1898e4b206c3a81d92ff0a25c3aadad49a46fe7bebaea

    • SSDEEP

      768:MkpLA8BtBV0QJcW5wqInmNSfyvwx+BKXCJW+trdvsWCJn66kvOR:hkQJcqwmIfj+ECJG/kvO

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

Persistence

Account Manipulation

1
T1098

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Remote System Discovery

2
T1018

Process Discovery

1
T1057

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks