Resubmissions

11-08-2024 23:53

240811-3xms4svfql 10

11-08-2024 23:16

240811-288paatekn 10

General

  • Target

    8c5f105eb24d29e66e1b89a734f0aada_JaffaCakes118

  • Size

    240KB

  • Sample

    240811-3xms4svfql

  • MD5

    8c5f105eb24d29e66e1b89a734f0aada

  • SHA1

    2d3fbdd86bd1e441f7050436e5eac56dade36541

  • SHA256

    563dd975f0211df190d9c1ac1538c16ea3a82aba413f199b5b7000c08570a1e2

  • SHA512

    b836ee8b2637d5122735618935caefa0d8359590357aa1ad90469f14028e9d1ce1edfa569aeb76bcf55895f253a7735f8891e9076570f79a45ae0bd4383e092b

  • SSDEEP

    6144:wLa94GN7fiIEAeLHJx0ZW6x6FJzw4E5i3ZUp/yq0DASrikrhwKACS:wW94GN7fiIEAeLHJx0ZWJjjNJcyq8rzs

Malware Config

Targets

    • Target

      8c5f105eb24d29e66e1b89a734f0aada_JaffaCakes118

    • Size

      240KB

    • MD5

      8c5f105eb24d29e66e1b89a734f0aada

    • SHA1

      2d3fbdd86bd1e441f7050436e5eac56dade36541

    • SHA256

      563dd975f0211df190d9c1ac1538c16ea3a82aba413f199b5b7000c08570a1e2

    • SHA512

      b836ee8b2637d5122735618935caefa0d8359590357aa1ad90469f14028e9d1ce1edfa569aeb76bcf55895f253a7735f8891e9076570f79a45ae0bd4383e092b

    • SSDEEP

      6144:wLa94GN7fiIEAeLHJx0ZW6x6FJzw4E5i3ZUp/yq0DASrikrhwKACS:wW94GN7fiIEAeLHJx0ZWJjjNJcyq8rzs

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks