General

  • Target

    c9675564c4208ac7865611eff2e48f11_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240829-xc7pwswakh

  • MD5

    c9675564c4208ac7865611eff2e48f11

  • SHA1

    2f9b16299dc1fdd4751915361a4cd6225267d99d

  • SHA256

    674b204d76fde06ea2af8d8f61a915229e685c505dadd045868624bb0a791811

  • SHA512

    e8a90d87f4ac7d583f1051b0761ef8e931ac4b42ed0f38a517ca304bc86cd9626a9ef3b4ace46e1506b9015937f4ad280111ffd9a9bbf7e08e196d5fed84fe86

  • SSDEEP

    24576:hUzebIo7Q3DFuuL1LXEXkX1TzEVhdOPWtslFP+rZSba+fwZoQ+R:hfIoQ3DFuGLXEXkXFzEndJePQMr4Zov

Malware Config

Targets

    • Target

      c9675564c4208ac7865611eff2e48f11_JaffaCakes118

    • Size

      2.2MB

    • MD5

      c9675564c4208ac7865611eff2e48f11

    • SHA1

      2f9b16299dc1fdd4751915361a4cd6225267d99d

    • SHA256

      674b204d76fde06ea2af8d8f61a915229e685c505dadd045868624bb0a791811

    • SHA512

      e8a90d87f4ac7d583f1051b0761ef8e931ac4b42ed0f38a517ca304bc86cd9626a9ef3b4ace46e1506b9015937f4ad280111ffd9a9bbf7e08e196d5fed84fe86

    • SSDEEP

      24576:hUzebIo7Q3DFuuL1LXEXkX1TzEVhdOPWtslFP+rZSba+fwZoQ+R:hfIoQ3DFuGLXEXkXFzEndJePQMr4Zov

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks