General

  • Target

    79dbbe2f3e73d24d661219c593a8bfa1_JaffaCakes118

  • Size

    426KB

  • Sample

    240730-ytxrpazhpb

  • MD5

    79dbbe2f3e73d24d661219c593a8bfa1

  • SHA1

    e9b2994905b29235881c8cb7ce7af6e96ec89d54

  • SHA256

    111e6fb4fa87fa887a993c4284c4d0c05a608af2e82807ef0c06a99a450fd641

  • SHA512

    29d77ff3893f350a8bad4be8eebe53154b00cee6539ec10d6f7a0dbfb861255fccf9efc34adee45a3a80daf3e154edbc871a3ad0d9c8c493b84c36b5ffa97737

  • SSDEEP

    6144:5WqA/eRNYnaNSOuxpN780HaAR5kGqK+lTHqMqg:U/efYnnDNRbwTHVq

Malware Config

Targets

    • Target

      79dbbe2f3e73d24d661219c593a8bfa1_JaffaCakes118

    • Size

      426KB

    • MD5

      79dbbe2f3e73d24d661219c593a8bfa1

    • SHA1

      e9b2994905b29235881c8cb7ce7af6e96ec89d54

    • SHA256

      111e6fb4fa87fa887a993c4284c4d0c05a608af2e82807ef0c06a99a450fd641

    • SHA512

      29d77ff3893f350a8bad4be8eebe53154b00cee6539ec10d6f7a0dbfb861255fccf9efc34adee45a3a80daf3e154edbc871a3ad0d9c8c493b84c36b5ffa97737

    • SSDEEP

      6144:5WqA/eRNYnaNSOuxpN780HaAR5kGqK+lTHqMqg:U/efYnnDNRbwTHVq

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks