General

  • Target

    9a46c9dda90896bf7f62061fd9341480_JaffaCakes118

  • Size

    248KB

  • Sample

    240815-q3ey8svbqd

  • MD5

    9a46c9dda90896bf7f62061fd9341480

  • SHA1

    ed94e2262d5be6b1a1f0aa613bd6a9c55b87778c

  • SHA256

    18dc7547a582f181d55dfa08e285fcdfb10fc88b7969f03eb07393b0c3678f72

  • SHA512

    9eb81bfca5eefc5ad2a18bbe16c7b743f8871fc49617af822334b9ae369ada8bcf7cf062deb63f6610bb547df00cdd78dc829bed4f593bccef22b9ffc725c2b3

  • SSDEEP

    3072:PwdB0U0AXo7zaQcFO70dLZ3hkoi6zgt6tLlSvOS70+pH43/EG:odB0U0AY7+WWLd6o/zgQtJ4OWu/EG

Malware Config

Targets

    • Target

      9a46c9dda90896bf7f62061fd9341480_JaffaCakes118

    • Size

      248KB

    • MD5

      9a46c9dda90896bf7f62061fd9341480

    • SHA1

      ed94e2262d5be6b1a1f0aa613bd6a9c55b87778c

    • SHA256

      18dc7547a582f181d55dfa08e285fcdfb10fc88b7969f03eb07393b0c3678f72

    • SHA512

      9eb81bfca5eefc5ad2a18bbe16c7b743f8871fc49617af822334b9ae369ada8bcf7cf062deb63f6610bb547df00cdd78dc829bed4f593bccef22b9ffc725c2b3

    • SSDEEP

      3072:PwdB0U0AXo7zaQcFO70dLZ3hkoi6zgt6tLlSvOS70+pH43/EG:odB0U0AY7+WWLd6o/zgQtJ4OWu/EG

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks