General

  • Target

    b2cabdecef0e6dfac64a9dcd5db19c16_JaffaCakes118

  • Size

    5.6MB

  • Sample

    240821-kjhywsyfrh

  • MD5

    b2cabdecef0e6dfac64a9dcd5db19c16

  • SHA1

    096e2143ba51135ff79397e728b56222fead2364

  • SHA256

    61c65ccc37b6ced0f1a23a994e0e14404af6b6da2c285de50c86ec8d63e44664

  • SHA512

    703fbb98829cb12ef78f89722dff64138158a5f14aaf9820af7bd74fa684bf3cdbf64a07f4273d15b73f4a0ecc020b570d7d54b5f83ccb5f2f4c5924075e0faf

  • SSDEEP

    6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

Malware Config

Targets

    • Target

      b2cabdecef0e6dfac64a9dcd5db19c16_JaffaCakes118

    • Size

      5.6MB

    • MD5

      b2cabdecef0e6dfac64a9dcd5db19c16

    • SHA1

      096e2143ba51135ff79397e728b56222fead2364

    • SHA256

      61c65ccc37b6ced0f1a23a994e0e14404af6b6da2c285de50c86ec8d63e44664

    • SHA512

      703fbb98829cb12ef78f89722dff64138158a5f14aaf9820af7bd74fa684bf3cdbf64a07f4273d15b73f4a0ecc020b570d7d54b5f83ccb5f2f4c5924075e0faf

    • SSDEEP

      6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks