General

  • Target

    20c709b98a9cde5640b2ac7225b1017c_JaffaCakes118

  • Size

    169KB

  • Sample

    240703-czf58ssgrb

  • MD5

    20c709b98a9cde5640b2ac7225b1017c

  • SHA1

    299e8dcd4aa5f0979b929721456ce20f5c818603

  • SHA256

    5449e58a7ac5add1bf29fea34e52af5c0b19fa6c307e96311acd949b45ad8e32

  • SHA512

    78a7e6d5ff044a301c33763d36a9161e1ff3dd62ee57c46174598fdb0a95b72e0055efd923d69dddc0373f3b81b6e83b977f7329d1043e0950ab384777db7fd6

  • SSDEEP

    3072:ri/uRTXmpMzYt2GKD+yncYuNqsGfpUm9P2wuCKedI30EfHkK2fsYQrXvZBEuNFd:rimRTXmyoyfuosGfpUm9xuL0EfHkKQMN

Malware Config

Targets

    • Target

      20c709b98a9cde5640b2ac7225b1017c_JaffaCakes118

    • Size

      169KB

    • MD5

      20c709b98a9cde5640b2ac7225b1017c

    • SHA1

      299e8dcd4aa5f0979b929721456ce20f5c818603

    • SHA256

      5449e58a7ac5add1bf29fea34e52af5c0b19fa6c307e96311acd949b45ad8e32

    • SHA512

      78a7e6d5ff044a301c33763d36a9161e1ff3dd62ee57c46174598fdb0a95b72e0055efd923d69dddc0373f3b81b6e83b977f7329d1043e0950ab384777db7fd6

    • SSDEEP

      3072:ri/uRTXmpMzYt2GKD+yncYuNqsGfpUm9P2wuCKedI30EfHkK2fsYQrXvZBEuNFd:rimRTXmyoyfuosGfpUm9xuL0EfHkKQMN

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks