General

  • Target

    JaffaCakes118_01a93ef53355330ab4105c860f9f76a8

  • Size

    4.8MB

  • Sample

    250511-gba2jaxlv5

  • MD5

    01a93ef53355330ab4105c860f9f76a8

  • SHA1

    b1e1369278ff88958edfde04a31e729a12772118

  • SHA256

    facc6089e5bdd7363863e9d7426ad6de5fd94295affce870e065cd5a206ac76a

  • SHA512

    6d5e2a6c68cf838655eed700f05d639d1c0a316ce738ef82351675aec594fd2368fb2357797bee63b2162e8fed25d85c32d29c00c88c84e9bdcc2c15b3fbe4f7

  • SSDEEP

    98304:YWrSa24w3rQ/pE/JFBCnpcYiKAEXXPnsNSkUe:Ty4wesJFqpc8dXfUSe

Malware Config

Targets

    • Target

      JaffaCakes118_01a93ef53355330ab4105c860f9f76a8

    • Size

      4.8MB

    • MD5

      01a93ef53355330ab4105c860f9f76a8

    • SHA1

      b1e1369278ff88958edfde04a31e729a12772118

    • SHA256

      facc6089e5bdd7363863e9d7426ad6de5fd94295affce870e065cd5a206ac76a

    • SHA512

      6d5e2a6c68cf838655eed700f05d639d1c0a316ce738ef82351675aec594fd2368fb2357797bee63b2162e8fed25d85c32d29c00c88c84e9bdcc2c15b3fbe4f7

    • SSDEEP

      98304:YWrSa24w3rQ/pE/JFBCnpcYiKAEXXPnsNSkUe:Ty4wesJFqpc8dXfUSe

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops Chrome extension

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks

OSZAR »