General

  • Target

    5b62f14e5cec88f97b57b79ac610fac1_JaffaCakes118

  • Size

    280KB

  • Sample

    240719-lk9zfaxfph

  • MD5

    5b62f14e5cec88f97b57b79ac610fac1

  • SHA1

    b53849f9caf2c64561757b7936ab089ef0332e24

  • SHA256

    b55acd6c457b5286581ffc4819c0229d788e7c35b624041423ae9b0834e03cdb

  • SHA512

    327a7182cdbc7629a0c963f06a68eeefd6d150fe134d6a9129dce07c0474ef1eb27183bad4f378a0d8b4a1d5fb128e02bcad5a57c9ddb73bce7fee4d6f0d965e

  • SSDEEP

    6144:agI0iAFCfPy8znist5ymykgXB2u0mRNF9sZ:O5byr2uNLF9s

Malware Config

Targets

    • Target

      5b62f14e5cec88f97b57b79ac610fac1_JaffaCakes118

    • Size

      280KB

    • MD5

      5b62f14e5cec88f97b57b79ac610fac1

    • SHA1

      b53849f9caf2c64561757b7936ab089ef0332e24

    • SHA256

      b55acd6c457b5286581ffc4819c0229d788e7c35b624041423ae9b0834e03cdb

    • SHA512

      327a7182cdbc7629a0c963f06a68eeefd6d150fe134d6a9129dce07c0474ef1eb27183bad4f378a0d8b4a1d5fb128e02bcad5a57c9ddb73bce7fee4d6f0d965e

    • SSDEEP

      6144:agI0iAFCfPy8znist5ymykgXB2u0mRNF9sZ:O5byr2uNLF9s

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks