General

  • Target

    2348cfa2799bbcb8c873f104cdb8fb8a_JaffaCakes118

  • Size

    284KB

  • Sample

    240703-wp8maa1ekp

  • MD5

    2348cfa2799bbcb8c873f104cdb8fb8a

  • SHA1

    1d5f42a4bbdc0c555ec8d0a8c236f5c7bb26d4da

  • SHA256

    18084e63240d9f1ddc54d98136c7c9c1aec4ea33e042a99c16191c00200ba735

  • SHA512

    51101724f1434d3acf48a4136149e90dbbb9926e284d1ffb73d7612f397b8efc101cbadafc6df117964d905c02d1c462c109e340762259e853e013dd394b217f

  • SSDEEP

    6144:T1dlZro5ytFzpWs32LlTY5DljE0aZNrUJ/B/+FN9/WN0:T1dlZo5yVWs32NY11Go3mNRo0

Malware Config

Targets

    • Target

      2348cfa2799bbcb8c873f104cdb8fb8a_JaffaCakes118

    • Size

      284KB

    • MD5

      2348cfa2799bbcb8c873f104cdb8fb8a

    • SHA1

      1d5f42a4bbdc0c555ec8d0a8c236f5c7bb26d4da

    • SHA256

      18084e63240d9f1ddc54d98136c7c9c1aec4ea33e042a99c16191c00200ba735

    • SHA512

      51101724f1434d3acf48a4136149e90dbbb9926e284d1ffb73d7612f397b8efc101cbadafc6df117964d905c02d1c462c109e340762259e853e013dd394b217f

    • SSDEEP

      6144:T1dlZro5ytFzpWs32LlTY5DljE0aZNrUJ/B/+FN9/WN0:T1dlZo5yVWs32NY11Go3mNRo0

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks