General

  • Target

    12de83f0ab139b1ff0b3befcff587005_JaffaCakes118

  • Size

    116KB

  • Sample

    240626-wf1v3sybnk

  • MD5

    12de83f0ab139b1ff0b3befcff587005

  • SHA1

    832d4772bf93d2213a7b17bdc3e6cf91a4ffe455

  • SHA256

    0a1386d2792ce892d9d1de3c021cbf398b1598d19e6d03e8aebafa154a01dc3a

  • SHA512

    f1ec7869e4b18aaf80ec965de74f91e12f91b4605e9b19f2ed76a16063d6fb1d9169fcf582109734bebb9a71d3736aaf1d13778def29346fe65bd33db65b92bb

  • SSDEEP

    1536:BxcfwgEgZJ/0Fipjfuh2WxFSn9ziAN0vvyLcyoW1mcJ:3S/DuhhA9ziACHyLB1

Malware Config

Targets

    • Target

      12de83f0ab139b1ff0b3befcff587005_JaffaCakes118

    • Size

      116KB

    • MD5

      12de83f0ab139b1ff0b3befcff587005

    • SHA1

      832d4772bf93d2213a7b17bdc3e6cf91a4ffe455

    • SHA256

      0a1386d2792ce892d9d1de3c021cbf398b1598d19e6d03e8aebafa154a01dc3a

    • SHA512

      f1ec7869e4b18aaf80ec965de74f91e12f91b4605e9b19f2ed76a16063d6fb1d9169fcf582109734bebb9a71d3736aaf1d13778def29346fe65bd33db65b92bb

    • SSDEEP

      1536:BxcfwgEgZJ/0Fipjfuh2WxFSn9ziAN0vvyLcyoW1mcJ:3S/DuhhA9ziACHyLB1

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks