General

  • Target

    3d6ccea510c75c31d5166bcbc631cdc5_JaffaCakes118

  • Size

    232KB

  • Sample

    240712-px46hatfmn

  • MD5

    3d6ccea510c75c31d5166bcbc631cdc5

  • SHA1

    12598a6f18f98f2d764026c0a44a1d1d24fcc0a3

  • SHA256

    819d6e3c7e9c97aca0b962f9d43ea42ce1a71a357bce39640cf7a70ed6630b2b

  • SHA512

    a5c514f91a1c7a7afc41ca622aed8d3f49f9618bcec368a27cb2ac4d8d942b8e373344278702818328ff43a1d3b01a151ba782543b710ad1c1b304f2497623da

  • SSDEEP

    3072:q/gYMyMWhgRuETGycP/y4kJHVrk9oKG6CgI2zN+oq8eAhef0PSkHoWf4ECe:qtMzRuW9ms1rk9oKGDIN+o5dhIkI3EC

Malware Config

Targets

    • Target

      3d6ccea510c75c31d5166bcbc631cdc5_JaffaCakes118

    • Size

      232KB

    • MD5

      3d6ccea510c75c31d5166bcbc631cdc5

    • SHA1

      12598a6f18f98f2d764026c0a44a1d1d24fcc0a3

    • SHA256

      819d6e3c7e9c97aca0b962f9d43ea42ce1a71a357bce39640cf7a70ed6630b2b

    • SHA512

      a5c514f91a1c7a7afc41ca622aed8d3f49f9618bcec368a27cb2ac4d8d942b8e373344278702818328ff43a1d3b01a151ba782543b710ad1c1b304f2497623da

    • SSDEEP

      3072:q/gYMyMWhgRuETGycP/y4kJHVrk9oKG6CgI2zN+oq8eAhef0PSkHoWf4ECe:qtMzRuW9ms1rk9oKGDIN+o5dhIkI3EC

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks