General

  • Target

    cd439e5ff082e388278d325536bcef7c_JaffaCakes118

  • Size

    5.0MB

  • Sample

    240831-v2v2aaweqp

  • MD5

    cd439e5ff082e388278d325536bcef7c

  • SHA1

    36c4f94268b41bec4cf85681406204fc3f638b5d

  • SHA256

    696142c950f819e26e12494250cd2e862b5dfd61ad8121d808b771a6d5072241

  • SHA512

    f5d60f64cac4da818d77f286ef8200db0301a2aa70dcf90ca8a3ab6af1b15565bd3bfd7769afa15b806113f9aaeaa28278fffd37b8bf34ad6f9283de54b6ba37

  • SSDEEP

    6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

Malware Config

Targets

    • Target

      cd439e5ff082e388278d325536bcef7c_JaffaCakes118

    • Size

      5.0MB

    • MD5

      cd439e5ff082e388278d325536bcef7c

    • SHA1

      36c4f94268b41bec4cf85681406204fc3f638b5d

    • SHA256

      696142c950f819e26e12494250cd2e862b5dfd61ad8121d808b771a6d5072241

    • SHA512

      f5d60f64cac4da818d77f286ef8200db0301a2aa70dcf90ca8a3ab6af1b15565bd3bfd7769afa15b806113f9aaeaa28278fffd37b8bf34ad6f9283de54b6ba37

    • SSDEEP

      6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks