General

  • Target

    b97e11c9a73b49523c5665232354449e_JaffaCakes118

  • Size

    713KB

  • Sample

    240822-3hlbqstcqc

  • MD5

    b97e11c9a73b49523c5665232354449e

  • SHA1

    e5570e2f8b5914d71a9ec54b6e3458f8eadba919

  • SHA256

    b6077289fa1c83c97422fbc93892b5a05bea9fab7cb4d6f64c8ed12add22bbb2

  • SHA512

    2b935e5f1d32db1a38d7479f1f8fe7ef89896e0f9041b637a0be6ecb288b9bfe8b95b5e655d8ae38e60f81d26c40369eafa349e7ef9be4ea51e5bb82d2343cac

  • SSDEEP

    12288:9jjW2SC23NqEXtKz5s1LQk1n6qJb+0UT8lCjw4GKymr53noqSOKFYPAz:9eCwNTXAa1kCn6ab+0UTtwJKyW5g2Y

Malware Config

Targets

    • Target

      b97e11c9a73b49523c5665232354449e_JaffaCakes118

    • Size

      713KB

    • MD5

      b97e11c9a73b49523c5665232354449e

    • SHA1

      e5570e2f8b5914d71a9ec54b6e3458f8eadba919

    • SHA256

      b6077289fa1c83c97422fbc93892b5a05bea9fab7cb4d6f64c8ed12add22bbb2

    • SHA512

      2b935e5f1d32db1a38d7479f1f8fe7ef89896e0f9041b637a0be6ecb288b9bfe8b95b5e655d8ae38e60f81d26c40369eafa349e7ef9be4ea51e5bb82d2343cac

    • SSDEEP

      12288:9jjW2SC23NqEXtKz5s1LQk1n6qJb+0UT8lCjw4GKymr53noqSOKFYPAz:9eCwNTXAa1kCn6ab+0UTtwJKyW5g2Y

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks