General

  • Target

    24a8aa62c2e2a5caffcd400552cb60e7_JaffaCakes118

  • Size

    602KB

  • Sample

    240704-fbejaaxarg

  • MD5

    24a8aa62c2e2a5caffcd400552cb60e7

  • SHA1

    5e000929b5493f98f01bd525831a3bf7a46b4cd8

  • SHA256

    23ee565d880d89eff64c4193d0bf816871c60a2fc87858aaeadb417d21e3df7b

  • SHA512

    bcdab6fc977578868371ee1370bf40b47760f080c2a361970256d3cb86a1a22470d3d4b1a07040e9fce4020ed33de04df0e561527a787a751a22c0db75c52a89

  • SSDEEP

    6144:PZv/UtcH4d1yTTJDKjF0iiEt4TS3+D6YPHwQniojGLjwbrRbGydmL+6FGzyd278z:BkGH4dmTJ2J0iN3+DjTniKbbRqXrJ

Malware Config

Targets

    • Target

      24a8aa62c2e2a5caffcd400552cb60e7_JaffaCakes118

    • Size

      602KB

    • MD5

      24a8aa62c2e2a5caffcd400552cb60e7

    • SHA1

      5e000929b5493f98f01bd525831a3bf7a46b4cd8

    • SHA256

      23ee565d880d89eff64c4193d0bf816871c60a2fc87858aaeadb417d21e3df7b

    • SHA512

      bcdab6fc977578868371ee1370bf40b47760f080c2a361970256d3cb86a1a22470d3d4b1a07040e9fce4020ed33de04df0e561527a787a751a22c0db75c52a89

    • SSDEEP

      6144:PZv/UtcH4d1yTTJDKjF0iiEt4TS3+D6YPHwQniojGLjwbrRbGydmL+6FGzyd278z:BkGH4dmTJ2J0iN3+DjTniKbbRqXrJ

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks