General

  • Target

    d38f179b057a7dd91cdca34db51a0c08_JaffaCakes118

  • Size

    372KB

  • Sample

    240908-fae4esxbqk

  • MD5

    d38f179b057a7dd91cdca34db51a0c08

  • SHA1

    ace630d040759e360c8145a2214b0152630b4b33

  • SHA256

    9c2c62d4c59900ffbaa1d74d0f9694efcb20e82321646568c2fd7b2345fb3b3c

  • SHA512

    a7bead564fd4b945b02560c7b60b67b1c88f99231d0706de9db04693a0ecd2ed9d8b95c06cf246c1cbf8c1c8011226b9a9421790bf5b5a7086c55294029dadf0

  • SSDEEP

    6144:NR7/LHNoeTp1gm0rYMLOTvEBSq0w7xZ6s6igcnz/RfyhZ4TtbuIwx+BZGb0g5j:NVzdTp1gj0MLOT0SqRxo1igcz/UcTJuP

Malware Config

Targets

    • Target

      d38f179b057a7dd91cdca34db51a0c08_JaffaCakes118

    • Size

      372KB

    • MD5

      d38f179b057a7dd91cdca34db51a0c08

    • SHA1

      ace630d040759e360c8145a2214b0152630b4b33

    • SHA256

      9c2c62d4c59900ffbaa1d74d0f9694efcb20e82321646568c2fd7b2345fb3b3c

    • SHA512

      a7bead564fd4b945b02560c7b60b67b1c88f99231d0706de9db04693a0ecd2ed9d8b95c06cf246c1cbf8c1c8011226b9a9421790bf5b5a7086c55294029dadf0

    • SSDEEP

      6144:NR7/LHNoeTp1gm0rYMLOTvEBSq0w7xZ6s6igcnz/RfyhZ4TtbuIwx+BZGb0g5j:NVzdTp1gj0MLOT0SqRxo1igcz/UcTJuP

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks