General

  • Target

    88b32f64d48b88f4cb329dc9ec2188b9_JaffaCakes118

  • Size

    380KB

  • Sample

    240811-dbxczswbjd

  • MD5

    88b32f64d48b88f4cb329dc9ec2188b9

  • SHA1

    36dce9ff63a2fcc823c3cb1744fa27cbeaeacd76

  • SHA256

    c90a60e3ea860b308d5adcac1bd58b6f94fbea2e3a968bf5725824ce423aad0b

  • SHA512

    1bf414ff2fe0c12d7bd692b37dc0fab7c2dde97c9d5f6b2d384caa589ceec6fd4b930a790d7f421db7143bb374d02e965679f63957ca201bfd79f8ca5d0b3fa5

  • SSDEEP

    6144:49HcdmPVjJx0Tqs2ElEnSTtaogKsslkmhngKsqdGqSnRAHVe9Lapgs/O8cZLAUmj:jdIJ2gsRcZLAUxMvLq8MyFqWDF

Malware Config

Targets

    • Target

      88b32f64d48b88f4cb329dc9ec2188b9_JaffaCakes118

    • Size

      380KB

    • MD5

      88b32f64d48b88f4cb329dc9ec2188b9

    • SHA1

      36dce9ff63a2fcc823c3cb1744fa27cbeaeacd76

    • SHA256

      c90a60e3ea860b308d5adcac1bd58b6f94fbea2e3a968bf5725824ce423aad0b

    • SHA512

      1bf414ff2fe0c12d7bd692b37dc0fab7c2dde97c9d5f6b2d384caa589ceec6fd4b930a790d7f421db7143bb374d02e965679f63957ca201bfd79f8ca5d0b3fa5

    • SSDEEP

      6144:49HcdmPVjJx0Tqs2ElEnSTtaogKsslkmhngKsqdGqSnRAHVe9Lapgs/O8cZLAUmj:jdIJ2gsRcZLAUxMvLq8MyFqWDF

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks