General

  • Target

    d69aa173ddd88a016b9e177e62a8387c_JaffaCakes118

  • Size

    352KB

  • Sample

    240909-szce2svhnp

  • MD5

    d69aa173ddd88a016b9e177e62a8387c

  • SHA1

    91cf4469c80c51eecfd9b2b6db777c0628b7202d

  • SHA256

    f9f7173f26836444033efaa9ad2fb04c443004d4c31308fc7c98f295dcd5be2e

  • SHA512

    fdef8936ae38fd2ecb18d282d9c184bed3c53c96181e7fd7f2733719fae45652b1c263387f5e47a47dfaf31b4db30207488a1f88b49674fcb5692c790f67dae6

  • SSDEEP

    6144:1tIleJcUVgS16Ws79FepxWULbxM+RX+FuxOvkhauFd5fJ:1tIleJcUVgSa6MU/xMcRxOvkhX5fJ

Malware Config

Targets

    • Target

      d69aa173ddd88a016b9e177e62a8387c_JaffaCakes118

    • Size

      352KB

    • MD5

      d69aa173ddd88a016b9e177e62a8387c

    • SHA1

      91cf4469c80c51eecfd9b2b6db777c0628b7202d

    • SHA256

      f9f7173f26836444033efaa9ad2fb04c443004d4c31308fc7c98f295dcd5be2e

    • SHA512

      fdef8936ae38fd2ecb18d282d9c184bed3c53c96181e7fd7f2733719fae45652b1c263387f5e47a47dfaf31b4db30207488a1f88b49674fcb5692c790f67dae6

    • SSDEEP

      6144:1tIleJcUVgS16Ws79FepxWULbxM+RX+FuxOvkhauFd5fJ:1tIleJcUVgSa6MU/xMcRxOvkhX5fJ

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks