General

  • Target

    25ec69412531b4ac0ee8abffe7cfe60a_JaffaCakes118

  • Size

    104KB

  • Sample

    240704-xtr1rswfkb

  • MD5

    25ec69412531b4ac0ee8abffe7cfe60a

  • SHA1

    c6b3ffd8a02f8baa15a4f5cf2c2f2b851bd8089f

  • SHA256

    8cc0c19b9a9f5b46ad2dc47537f10c501ded27f4873f818a4f04e062818331d1

  • SHA512

    32d40544d5ca1a44f3239023d38691e17e08581ebe79c906e3bf59380d47298f6bf09860b2ec18eb9bc76ceb63c06e18332fd6a3084dc83f249d7add32f7c526

  • SSDEEP

    3072:aXyehnXQUZZb0x2OfqzIyrg507v7Rl80PcqR:aCehXQUZZb0QOfqV007v7RC0

Malware Config

Targets

    • Target

      25ec69412531b4ac0ee8abffe7cfe60a_JaffaCakes118

    • Size

      104KB

    • MD5

      25ec69412531b4ac0ee8abffe7cfe60a

    • SHA1

      c6b3ffd8a02f8baa15a4f5cf2c2f2b851bd8089f

    • SHA256

      8cc0c19b9a9f5b46ad2dc47537f10c501ded27f4873f818a4f04e062818331d1

    • SHA512

      32d40544d5ca1a44f3239023d38691e17e08581ebe79c906e3bf59380d47298f6bf09860b2ec18eb9bc76ceb63c06e18332fd6a3084dc83f249d7add32f7c526

    • SSDEEP

      3072:aXyehnXQUZZb0x2OfqzIyrg507v7Rl80PcqR:aCehXQUZZb0QOfqV007v7RC0

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks