General

  • Target

    86e0a65c4233d5a9d74bae394e68df0f_JaffaCakes118

  • Size

    866KB

  • Sample

    240531-nt78bagf55

  • MD5

    86e0a65c4233d5a9d74bae394e68df0f

  • SHA1

    cef07a38958a6a44e5a4421cde7a674a8c293c0d

  • SHA256

    c35a8b3b3b954f61354068c0fc1fa3178c866dfe0eb7c04081b3b4f76991b197

  • SHA512

    1834d2b9306e9ce84052d04ffcff5ef00caf46b3d0d1e78510ccef5d55c56eef7502b742084d7b9ce70678bc3c10d8c728a82b2c3714e01f13431353149e324b

  • SSDEEP

    24576:hHe2nkxC790RisyxI63NHwI54nP2WUOdH2me:RgbcsyxIswI5Q2WUiH2m

Malware Config

Targets

    • Target

      86e0a65c4233d5a9d74bae394e68df0f_JaffaCakes118

    • Size

      866KB

    • MD5

      86e0a65c4233d5a9d74bae394e68df0f

    • SHA1

      cef07a38958a6a44e5a4421cde7a674a8c293c0d

    • SHA256

      c35a8b3b3b954f61354068c0fc1fa3178c866dfe0eb7c04081b3b4f76991b197

    • SHA512

      1834d2b9306e9ce84052d04ffcff5ef00caf46b3d0d1e78510ccef5d55c56eef7502b742084d7b9ce70678bc3c10d8c728a82b2c3714e01f13431353149e324b

    • SSDEEP

      24576:hHe2nkxC790RisyxI63NHwI54nP2WUOdH2me:RgbcsyxIswI5Q2WUiH2m

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks