General

  • Target

    6392ab8c6c194dc2bcaa2ae5b5166d4f_JaffaCakes118

  • Size

    214KB

  • Sample

    240722-r1plbsserf

  • MD5

    6392ab8c6c194dc2bcaa2ae5b5166d4f

  • SHA1

    55d604d051b1d0459f885ed4ebb9cdf9c8fe9b20

  • SHA256

    37abcda409909bae474da0205815688b2535404c35a1dce526cab1e1cf6e03fb

  • SHA512

    f26b4a84ca25601b79ad0aa24873233ad6c3c332472cea9edd4cf6c2c4e0100f4873d715d38a66fd5b6645bc925199e086f9bd4b2fc379c724c1cb2ec8f39bd1

  • SSDEEP

    3072:EMLOBGMTX0EoVbCh0Rw0omskhdPe/uN5yK2TQ:EMO8MTX0EoVbCaRskhZp5y

Malware Config

Targets

    • Target

      6392ab8c6c194dc2bcaa2ae5b5166d4f_JaffaCakes118

    • Size

      214KB

    • MD5

      6392ab8c6c194dc2bcaa2ae5b5166d4f

    • SHA1

      55d604d051b1d0459f885ed4ebb9cdf9c8fe9b20

    • SHA256

      37abcda409909bae474da0205815688b2535404c35a1dce526cab1e1cf6e03fb

    • SHA512

      f26b4a84ca25601b79ad0aa24873233ad6c3c332472cea9edd4cf6c2c4e0100f4873d715d38a66fd5b6645bc925199e086f9bd4b2fc379c724c1cb2ec8f39bd1

    • SSDEEP

      3072:EMLOBGMTX0EoVbCh0Rw0omskhdPe/uN5yK2TQ:EMO8MTX0EoVbCaRskhZp5y

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks