General

  • Target

    c6906c96dff316f1a2525980ccad5fdd_JaffaCakes118

  • Size

    595KB

  • Sample

    240828-k6dmpasfjg

  • MD5

    c6906c96dff316f1a2525980ccad5fdd

  • SHA1

    9becb7009df39331a7c693c871d6e2c5bd28e805

  • SHA256

    ccf736f7cd9a9e92db675dbb7dc1ba47ec8332c078eea343e0877184f87d7fcd

  • SHA512

    fcebbbdd08260c8d6b47f9e614157c190bfbb8de36b59614e79708e5f5e0b9e7c75f9fecb489a2fe4b93edbb733ec4bcaa1caa738265263aa0a91ede601faf7f

  • SSDEEP

    6144:n2VZSbjwUhFZxfEtncaHvcl1gTfy7X2dIffr0uo3Jp5w2Cc+oifzUmkRPYaC:nkGbzrW0/GOfIuK5w2zhh1RPY

Malware Config

Targets

    • Target

      c6906c96dff316f1a2525980ccad5fdd_JaffaCakes118

    • Size

      595KB

    • MD5

      c6906c96dff316f1a2525980ccad5fdd

    • SHA1

      9becb7009df39331a7c693c871d6e2c5bd28e805

    • SHA256

      ccf736f7cd9a9e92db675dbb7dc1ba47ec8332c078eea343e0877184f87d7fcd

    • SHA512

      fcebbbdd08260c8d6b47f9e614157c190bfbb8de36b59614e79708e5f5e0b9e7c75f9fecb489a2fe4b93edbb733ec4bcaa1caa738265263aa0a91ede601faf7f

    • SSDEEP

      6144:n2VZSbjwUhFZxfEtncaHvcl1gTfy7X2dIffr0uo3Jp5w2Cc+oifzUmkRPYaC:nkGbzrW0/GOfIuK5w2zhh1RPY

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks