General

  • Target

    be1a20e64ff1c176035c672a05341b75_JaffaCakes118

  • Size

    4.2MB

  • Sample

    240824-hrk24szfrq

  • MD5

    be1a20e64ff1c176035c672a05341b75

  • SHA1

    454eaf52058b2d9dc2d085c26678cf97c352c292

  • SHA256

    300ffcf7f7b1d9ee344348d1eaff48dec390ac28cf080ab39b79b881c03b6ee2

  • SHA512

    fc73593280ab0365c693886db42d1f5c8811b2a721933be5a4944ee41dd4f58046ace976743a38a981ec88be1d87b6a98cc06f95ad29f3e75b19b07a1a4b1a6e

  • SSDEEP

    6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

Malware Config

Targets

    • Target

      be1a20e64ff1c176035c672a05341b75_JaffaCakes118

    • Size

      4.2MB

    • MD5

      be1a20e64ff1c176035c672a05341b75

    • SHA1

      454eaf52058b2d9dc2d085c26678cf97c352c292

    • SHA256

      300ffcf7f7b1d9ee344348d1eaff48dec390ac28cf080ab39b79b881c03b6ee2

    • SHA512

      fc73593280ab0365c693886db42d1f5c8811b2a721933be5a4944ee41dd4f58046ace976743a38a981ec88be1d87b6a98cc06f95ad29f3e75b19b07a1a4b1a6e

    • SSDEEP

      6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks