General

  • Target

    54fb130e36f9335f843e242559cb2b0c_JaffaCakes118

  • Size

    868KB

  • Sample

    240518-qxndesea82

  • MD5

    54fb130e36f9335f843e242559cb2b0c

  • SHA1

    3f87bfafd292e7c22ebfc0b76ff7c7ec40c2a256

  • SHA256

    d6637c6c05a5268fccd2602cd7d384f57448b570f38aab1f752dab4c1af00c59

  • SHA512

    49485abcae8de4c7fc7c57f4359e0046e14565273ba73d96715e8c89371c7c9d3615d7ab0ab9983b0edcbf38706f5a6f4504aaf371fc9a48ea695a2a05761e27

  • SSDEEP

    12288:NtQN+pguUxLeEpvF+z7E5QvNvlgTJmvsEs+ZSnR+is1igoe+esTCm:zQ4pI2lvllV0X+Z64j1ig42m

Malware Config

Targets

    • Target

      54fb130e36f9335f843e242559cb2b0c_JaffaCakes118

    • Size

      868KB

    • MD5

      54fb130e36f9335f843e242559cb2b0c

    • SHA1

      3f87bfafd292e7c22ebfc0b76ff7c7ec40c2a256

    • SHA256

      d6637c6c05a5268fccd2602cd7d384f57448b570f38aab1f752dab4c1af00c59

    • SHA512

      49485abcae8de4c7fc7c57f4359e0046e14565273ba73d96715e8c89371c7c9d3615d7ab0ab9983b0edcbf38706f5a6f4504aaf371fc9a48ea695a2a05761e27

    • SSDEEP

      12288:NtQN+pguUxLeEpvF+z7E5QvNvlgTJmvsEs+ZSnR+is1igoe+esTCm:zQ4pI2lvllV0X+Z64j1ig42m

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks