General

  • Target

    2d8c1ee5a68ea7a0f99f922fb77f324b_JaffaCakes118

  • Size

    4.1MB

  • Sample

    240708-x6fs9svdpl

  • MD5

    2d8c1ee5a68ea7a0f99f922fb77f324b

  • SHA1

    175ceba8955b52395459686277aa2b518cbfb6ed

  • SHA256

    1641c4fdceed245cae1d54d5818a3762dc33e12e37390ef6eb9fea784d7478be

  • SHA512

    d64d00baf228ac067c9f26d3da3a916a51c38e052d8afeac38b037d9740608e4a1a885cb19cb2bc42dd7c10e62f1631e7f773c3dd5a28e25387d0297b5943135

  • SSDEEP

    6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

Malware Config

Targets

    • Target

      2d8c1ee5a68ea7a0f99f922fb77f324b_JaffaCakes118

    • Size

      4.1MB

    • MD5

      2d8c1ee5a68ea7a0f99f922fb77f324b

    • SHA1

      175ceba8955b52395459686277aa2b518cbfb6ed

    • SHA256

      1641c4fdceed245cae1d54d5818a3762dc33e12e37390ef6eb9fea784d7478be

    • SHA512

      d64d00baf228ac067c9f26d3da3a916a51c38e052d8afeac38b037d9740608e4a1a885cb19cb2bc42dd7c10e62f1631e7f773c3dd5a28e25387d0297b5943135

    • SSDEEP

      6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks