General

  • Target

    121d0b20a7ea0aff94c9951ab2a22c71_JaffaCakes118

  • Size

    844KB

  • Sample

    240626-qmecrsyhln

  • MD5

    121d0b20a7ea0aff94c9951ab2a22c71

  • SHA1

    d7794361d73ea95d5748a9d60b9acbb479b8762e

  • SHA256

    dc7f36e303ad160f0f4c6f2af9fab5837571998f9f4fc7817ca05fe717493c59

  • SHA512

    103ce92ece47d2b7b9f5eb0d28c13017c4e02982067e4a3458af1f5e7b593ea2cf5d4f9b5755eab5d4cad3eb0ed1ca41b59b263014192a979b006d7bb1c4bc13

  • SSDEEP

    12288:djTwOslBgVCkoSCTyyZ27HjUtbnW3h0pKN3fl1aLUK40nnVanE4syALPwWbyFYMM:ZTwOsI04CyyaUtbMEKtS4K40VwxjoRk

Malware Config

Targets

    • Target

      121d0b20a7ea0aff94c9951ab2a22c71_JaffaCakes118

    • Size

      844KB

    • MD5

      121d0b20a7ea0aff94c9951ab2a22c71

    • SHA1

      d7794361d73ea95d5748a9d60b9acbb479b8762e

    • SHA256

      dc7f36e303ad160f0f4c6f2af9fab5837571998f9f4fc7817ca05fe717493c59

    • SHA512

      103ce92ece47d2b7b9f5eb0d28c13017c4e02982067e4a3458af1f5e7b593ea2cf5d4f9b5755eab5d4cad3eb0ed1ca41b59b263014192a979b006d7bb1c4bc13

    • SSDEEP

      12288:djTwOslBgVCkoSCTyyZ27HjUtbnW3h0pKN3fl1aLUK40nnVanE4syALPwWbyFYMM:ZTwOsI04CyyaUtbMEKtS4K40VwxjoRk

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks