General

  • Target

    bf1c0c4d3a3f288fd72ab11478ef2443_JaffaCakes118

  • Size

    116KB

  • Sample

    240824-v3z2mashnp

  • MD5

    bf1c0c4d3a3f288fd72ab11478ef2443

  • SHA1

    05742949ed8897cd4ae026049636df857165cdba

  • SHA256

    51c318592661ec3e2f17669ca0a666b59054a423ef1371f5b193388affe24c6e

  • SHA512

    6901d6a4caf669d98f1545f7083b41d9f8378befcf9346d9a62595e2d6113896054610716ea9f75d05c79ead70da07a75205db8963544b6e89357b1d05e55cb8

  • SSDEEP

    1536:RNzJ67GFYiExZdg9SpGz39h2WxFSn9ziAN0vvyLcyoW1mc+:6rdpGz39hhA9ziACHyLBi

Malware Config

Targets

    • Target

      bf1c0c4d3a3f288fd72ab11478ef2443_JaffaCakes118

    • Size

      116KB

    • MD5

      bf1c0c4d3a3f288fd72ab11478ef2443

    • SHA1

      05742949ed8897cd4ae026049636df857165cdba

    • SHA256

      51c318592661ec3e2f17669ca0a666b59054a423ef1371f5b193388affe24c6e

    • SHA512

      6901d6a4caf669d98f1545f7083b41d9f8378befcf9346d9a62595e2d6113896054610716ea9f75d05c79ead70da07a75205db8963544b6e89357b1d05e55cb8

    • SSDEEP

      1536:RNzJ67GFYiExZdg9SpGz39h2WxFSn9ziAN0vvyLcyoW1mc+:6rdpGz39hhA9ziACHyLBi

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks