General

  • Target

    4ece9e1e721cd7dc5a270b3cf7d1f083_JaffaCakes118

  • Size

    696KB

  • Sample

    240716-r72t8s1ape

  • MD5

    4ece9e1e721cd7dc5a270b3cf7d1f083

  • SHA1

    a863b9cb0531deee7e356f2534a39723b5ee929b

  • SHA256

    ec10f4e43d71e5d52862f7d11af464316b4301254f62fedfba385a097923ffa4

  • SHA512

    8560755a71bb652cad90839b85d5f6f8d63984b1e5e8a887ec55d38a206451fb6c639aafd6cc4f904b776081b9c940800c3100125dbfcdd65c7e1fda4d3c14be

  • SSDEEP

    12288:3m1+jgi2aZFMZj7Kexe2f27HjUtbnbKEFsB61a9tNMbFynKNJDzGGpZJD:yxqZaZjWy2Utbusd1a9tObFynKHGG1

Malware Config

Targets

    • Target

      4ece9e1e721cd7dc5a270b3cf7d1f083_JaffaCakes118

    • Size

      696KB

    • MD5

      4ece9e1e721cd7dc5a270b3cf7d1f083

    • SHA1

      a863b9cb0531deee7e356f2534a39723b5ee929b

    • SHA256

      ec10f4e43d71e5d52862f7d11af464316b4301254f62fedfba385a097923ffa4

    • SHA512

      8560755a71bb652cad90839b85d5f6f8d63984b1e5e8a887ec55d38a206451fb6c639aafd6cc4f904b776081b9c940800c3100125dbfcdd65c7e1fda4d3c14be

    • SSDEEP

      12288:3m1+jgi2aZFMZj7Kexe2f27HjUtbnbKEFsB61a9tNMbFynKNJDzGGpZJD:yxqZaZjWy2Utbusd1a9tObFynKHGG1

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks