General

  • Target

    7d306b63492e111434a68d343259f1b5_JaffaCakes118

  • Size

    536KB

  • Sample

    240731-vavlfaybng

  • MD5

    7d306b63492e111434a68d343259f1b5

  • SHA1

    ae0bb21e16036f5ba2023ec623d8163aad9a9077

  • SHA256

    99cd0b4791ba31a7462d5c17b1e9a28c8be58063ce29cb975f217001041f1760

  • SHA512

    b575736a097b378e540aea8249eee17e9fbec3a4f8e9a4c0ae6c98694fe3a7f9850d3118c2a636c5af12fa965474f4f44afd442e2b524ed16e2116b303664bee

  • SSDEEP

    12288:U022tBnaBu7XYOGdVvdI6xQ4qvUVDBFkf+dmEdx4WeDMYc/J:UkBnaBu7IOGrvdIR4q4zkf+dT4W5rB

Malware Config

Targets

    • Target

      7d306b63492e111434a68d343259f1b5_JaffaCakes118

    • Size

      536KB

    • MD5

      7d306b63492e111434a68d343259f1b5

    • SHA1

      ae0bb21e16036f5ba2023ec623d8163aad9a9077

    • SHA256

      99cd0b4791ba31a7462d5c17b1e9a28c8be58063ce29cb975f217001041f1760

    • SHA512

      b575736a097b378e540aea8249eee17e9fbec3a4f8e9a4c0ae6c98694fe3a7f9850d3118c2a636c5af12fa965474f4f44afd442e2b524ed16e2116b303664bee

    • SSDEEP

      12288:U022tBnaBu7XYOGdVvdI6xQ4qvUVDBFkf+dmEdx4WeDMYc/J:UkBnaBu7IOGrvdIR4q4zkf+dT4W5rB

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks