General

  • Target

    cb51b706cbcb7d64cf679468e099b9af_JaffaCakes118

  • Size

    120KB

  • Sample

    240830-v5a6aaxblq

  • MD5

    cb51b706cbcb7d64cf679468e099b9af

  • SHA1

    98fbe71667b137bdb191fc5b5bf51487297283f6

  • SHA256

    a667935edc15dba0349d3035a428dbc6f13a3282cbf079757635e57698726db3

  • SHA512

    b3be9d357a91e3c3902c86402399cfe0c824a0ddb6dcb286e48e226cbccbbb666ed84e8cd446d66b24fc033d670807544bd7ad7ca774772739ef08421d8a3310

  • SSDEEP

    3072:6La94GN7fiIEAeLHJx0PUZFvoJn7c4/bY+lAhKiTCQlJL:6La94GN7fiIEAeLHJx0cTQJn7cnKiOQP

Malware Config

Targets

    • Target

      cb51b706cbcb7d64cf679468e099b9af_JaffaCakes118

    • Size

      120KB

    • MD5

      cb51b706cbcb7d64cf679468e099b9af

    • SHA1

      98fbe71667b137bdb191fc5b5bf51487297283f6

    • SHA256

      a667935edc15dba0349d3035a428dbc6f13a3282cbf079757635e57698726db3

    • SHA512

      b3be9d357a91e3c3902c86402399cfe0c824a0ddb6dcb286e48e226cbccbbb666ed84e8cd446d66b24fc033d670807544bd7ad7ca774772739ef08421d8a3310

    • SSDEEP

      3072:6La94GN7fiIEAeLHJx0PUZFvoJn7c4/bY+lAhKiTCQlJL:6La94GN7fiIEAeLHJx0cTQJn7cnKiOQP

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks