General

  • Target

    2d6103930ec97190c4afb291471267b0_JaffaCakes118

  • Size

    328KB

  • Sample

    240708-w4lq3asdnp

  • MD5

    2d6103930ec97190c4afb291471267b0

  • SHA1

    07ba29465901f13747af81d4e0818148b9299ac3

  • SHA256

    35fa115c88bb5ef8b052a9c4b2591ef64d9675c32b1930d3880284e01606a2da

  • SHA512

    110a7fe0272dd2d39082fc8b313eb348b605b44c618361bd20a372ebc478e4512ee330ad44650a298e585bcf01645c67a6abfc2918bd5ec4aec86cb600a44ebc

  • SSDEEP

    3072:OpmptfrOLUS2DBb+QeA9uXPD2zbY9iCZrZ4XGD4fIE/nZMLwnh:OpmptjOLUS2DBCxKzbYMtWD8IgnZMLw

Malware Config

Targets

    • Target

      2d6103930ec97190c4afb291471267b0_JaffaCakes118

    • Size

      328KB

    • MD5

      2d6103930ec97190c4afb291471267b0

    • SHA1

      07ba29465901f13747af81d4e0818148b9299ac3

    • SHA256

      35fa115c88bb5ef8b052a9c4b2591ef64d9675c32b1930d3880284e01606a2da

    • SHA512

      110a7fe0272dd2d39082fc8b313eb348b605b44c618361bd20a372ebc478e4512ee330ad44650a298e585bcf01645c67a6abfc2918bd5ec4aec86cb600a44ebc

    • SSDEEP

      3072:OpmptfrOLUS2DBb+QeA9uXPD2zbY9iCZrZ4XGD4fIE/nZMLwnh:OpmptjOLUS2DBCxKzbYMtWD8IgnZMLw

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks