General

  • Target

    7b3d660d3cf507cfc6631634fcb37f9f_JaffaCakes118

  • Size

    172KB

  • Sample

    240731-ezzcxszhqf

  • MD5

    7b3d660d3cf507cfc6631634fcb37f9f

  • SHA1

    01bd2de172541a7d727d0286aedfa8b22ef52c46

  • SHA256

    84a4ae8da468f498abd26fa2e623515e2bbf8453197ed464b265c8c28c3dbc69

  • SHA512

    83f6bc6dc9e6156de60ce13c42bef01fe42675091251dc7ab0320264e5981637ed0db277adf007fac3758360b5e33edb22bfd68a022b2b244e649d07ede2298d

  • SSDEEP

    3072:DKDAfCDSmJ7poBMEAvjgJisr5IOpiftZpMEaXWAVUo63964cYj:DReoBMzEJiOFQtZnEWEwvp

Malware Config

Targets

    • Target

      7b3d660d3cf507cfc6631634fcb37f9f_JaffaCakes118

    • Size

      172KB

    • MD5

      7b3d660d3cf507cfc6631634fcb37f9f

    • SHA1

      01bd2de172541a7d727d0286aedfa8b22ef52c46

    • SHA256

      84a4ae8da468f498abd26fa2e623515e2bbf8453197ed464b265c8c28c3dbc69

    • SHA512

      83f6bc6dc9e6156de60ce13c42bef01fe42675091251dc7ab0320264e5981637ed0db277adf007fac3758360b5e33edb22bfd68a022b2b244e649d07ede2298d

    • SSDEEP

      3072:DKDAfCDSmJ7poBMEAvjgJisr5IOpiftZpMEaXWAVUo63964cYj:DReoBMzEJiOFQtZnEWEwvp

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks