General

  • Target

    cdb48abdb2c5e70a3f5fc48c0db0275e_JaffaCakes118

  • Size

    5.0MB

  • Sample

    240831-2ahefayejn

  • MD5

    cdb48abdb2c5e70a3f5fc48c0db0275e

  • SHA1

    6a0bf23984f9e6f134ba4b1abf9e102ef2c48532

  • SHA256

    4af5ee46602b3eef593e9562384ccd56e029a3a374f78b37deb069bb435f39f5

  • SHA512

    93d22dc893c01591552fe000f7cb648c98de36ded911c5bd1d8da4e77b48474a26db4be4a825be75fdb2833c4320c9cca764cb12d5bfa342c1a6fdfaacd13c7c

  • SSDEEP

    6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

Malware Config

Targets

    • Target

      cdb48abdb2c5e70a3f5fc48c0db0275e_JaffaCakes118

    • Size

      5.0MB

    • MD5

      cdb48abdb2c5e70a3f5fc48c0db0275e

    • SHA1

      6a0bf23984f9e6f134ba4b1abf9e102ef2c48532

    • SHA256

      4af5ee46602b3eef593e9562384ccd56e029a3a374f78b37deb069bb435f39f5

    • SHA512

      93d22dc893c01591552fe000f7cb648c98de36ded911c5bd1d8da4e77b48474a26db4be4a825be75fdb2833c4320c9cca764cb12d5bfa342c1a6fdfaacd13c7c

    • SSDEEP

      6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks