General

  • Target

    cf378ff9c338f8e3fe2ccbc279ccb2d8_JaffaCakes118

  • Size

    276KB

  • Sample

    240906-ldf3sayfkf

  • MD5

    cf378ff9c338f8e3fe2ccbc279ccb2d8

  • SHA1

    aa49bb7ae6537617c001e72b1bb3add56fb25340

  • SHA256

    ba59dfee0118b34605cc03bb0b53033adf9f84d97f3dd91c41a857708237dfd9

  • SHA512

    bbed1e295569b7b7d06ea64a710a9f860fa4d4a137d0face966a86dccce65e88258f21463d17aada2e118f36d42b5c3f4da2ce1eaf50a8f2f9d082d73aaeeeae

  • SSDEEP

    6144:h+fyWABddKtrqpOsJ2as+/IkgW86+qy9EWL1nhAGEr3nX1l:h+fqdstrqQsJb/ccy9EWhhQ1

Malware Config

Targets

    • Target

      cf378ff9c338f8e3fe2ccbc279ccb2d8_JaffaCakes118

    • Size

      276KB

    • MD5

      cf378ff9c338f8e3fe2ccbc279ccb2d8

    • SHA1

      aa49bb7ae6537617c001e72b1bb3add56fb25340

    • SHA256

      ba59dfee0118b34605cc03bb0b53033adf9f84d97f3dd91c41a857708237dfd9

    • SHA512

      bbed1e295569b7b7d06ea64a710a9f860fa4d4a137d0face966a86dccce65e88258f21463d17aada2e118f36d42b5c3f4da2ce1eaf50a8f2f9d082d73aaeeeae

    • SSDEEP

      6144:h+fyWABddKtrqpOsJ2as+/IkgW86+qy9EWL1nhAGEr3nX1l:h+fqdstrqQsJb/ccy9EWhhQ1

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks