General

  • Target

    b6395793ba19c6fa00f3bf3000e14a0c_JaffaCakes118

  • Size

    328KB

  • Sample

    240822-ebznsaxaqa

  • MD5

    b6395793ba19c6fa00f3bf3000e14a0c

  • SHA1

    74c3a3f6ada501e7f3f1938c8b0dca65a06d1f66

  • SHA256

    e5bb390d7ddab6f9e2643c7cb08102403ee8df2cc1324c695d057215ad5c27b1

  • SHA512

    58bf64106262adef851db7d86eb1a5ebd22bf5f994e79668a9cead5a4147a8d3e3c5e62bba12c432b144c311ccb8014d16bb94676006fc4b6468e34af5e11930

  • SSDEEP

    3072:VsuFj9G9qW6DtkDNrvrUF3UzmVURsZefVSP0C2rlgKTWUXT/4w6RXFXjHe6gOLfJ:VvA8kxw+wUIeG2EUDwPdH9gm0mbH

Malware Config

Targets

    • Target

      b6395793ba19c6fa00f3bf3000e14a0c_JaffaCakes118

    • Size

      328KB

    • MD5

      b6395793ba19c6fa00f3bf3000e14a0c

    • SHA1

      74c3a3f6ada501e7f3f1938c8b0dca65a06d1f66

    • SHA256

      e5bb390d7ddab6f9e2643c7cb08102403ee8df2cc1324c695d057215ad5c27b1

    • SHA512

      58bf64106262adef851db7d86eb1a5ebd22bf5f994e79668a9cead5a4147a8d3e3c5e62bba12c432b144c311ccb8014d16bb94676006fc4b6468e34af5e11930

    • SSDEEP

      3072:VsuFj9G9qW6DtkDNrvrUF3UzmVURsZefVSP0C2rlgKTWUXT/4w6RXFXjHe6gOLfJ:VvA8kxw+wUIeG2EUDwPdH9gm0mbH

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks