General

  • Target

    70097197116270790a3824cec0567321_JaffaCakes118

  • Size

    4.8MB

  • Sample

    240725-r65vhaxepe

  • MD5

    70097197116270790a3824cec0567321

  • SHA1

    d392dd04be60100240634e41ded5bc8f04378b27

  • SHA256

    631d05a691f810293ff0fc64df7d727a0c2fbd26abf93bad0b2daf8458595e4a

  • SHA512

    965693b1a33008c8c334e0b841fdeea10df80de2e088ca68685078662ce2e7a621038ac463055cf02db5d9fc65d22da88b2b4c56ef64dd2917c8922ce07be2c1

  • SSDEEP

    6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

Malware Config

Targets

    • Target

      70097197116270790a3824cec0567321_JaffaCakes118

    • Size

      4.8MB

    • MD5

      70097197116270790a3824cec0567321

    • SHA1

      d392dd04be60100240634e41ded5bc8f04378b27

    • SHA256

      631d05a691f810293ff0fc64df7d727a0c2fbd26abf93bad0b2daf8458595e4a

    • SHA512

      965693b1a33008c8c334e0b841fdeea10df80de2e088ca68685078662ce2e7a621038ac463055cf02db5d9fc65d22da88b2b4c56ef64dd2917c8922ce07be2c1

    • SSDEEP

      6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks