General

  • Target

    48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118

  • Size

    936KB

  • Sample

    240715-hxtanstgpm

  • MD5

    48bc87a9204fe25e1a18bf2640dfed61

  • SHA1

    7430784fe61fb6e8de9cdd5b5365e81b9bb793e0

  • SHA256

    0ce512a25f2e1f57c65984db9e01998ce514000672050e32a7ec6b624ecdea6f

  • SHA512

    ad4f61800bdcd419e166fec4855708d10817f864393b96564e58fd9f165f480011ace5b1b73eb633880d9d65589016e87908c880738fc404523c448611243b36

  • SSDEEP

    24576:V7q55ahO1N+AuTpoLb+/k1AMDhHxRHONMJ5:V255ahO1N+DTpoX+/m9HyNMT

Malware Config

Targets

    • Target

      48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118

    • Size

      936KB

    • MD5

      48bc87a9204fe25e1a18bf2640dfed61

    • SHA1

      7430784fe61fb6e8de9cdd5b5365e81b9bb793e0

    • SHA256

      0ce512a25f2e1f57c65984db9e01998ce514000672050e32a7ec6b624ecdea6f

    • SHA512

      ad4f61800bdcd419e166fec4855708d10817f864393b96564e58fd9f165f480011ace5b1b73eb633880d9d65589016e87908c880738fc404523c448611243b36

    • SSDEEP

      24576:V7q55ahO1N+AuTpoLb+/k1AMDhHxRHONMJ5:V255ahO1N+DTpoX+/m9HyNMT

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks