General

  • Target

    dd203810b11db9d714570d7ae5292e2f_JaffaCakes118

  • Size

    125KB

  • Sample

    240912-1v4yhaxfqc

  • MD5

    dd203810b11db9d714570d7ae5292e2f

  • SHA1

    92b59df3ba9a21568416efe8c6724333f42864e3

  • SHA256

    9a203b90ac6e81f7368115e2ef687807c8293c2886c453d4d10bd9cd39344d30

  • SHA512

    d4768dbbd03c403cff50baa9272eb46a65ed32a29d4681d58e12cad9db75b5598b466042b208904861d7a55ae4a0c65872463d3e240e43fb2279faeaab309a8a

  • SSDEEP

    3072:jwmePjkNoEeF/DKoHGfsm/bvVx+EBpbxdCKGKl8SsO:QjkNXqY/D+qpXQKxsO

Malware Config

Targets

    • Target

      dd203810b11db9d714570d7ae5292e2f_JaffaCakes118

    • Size

      125KB

    • MD5

      dd203810b11db9d714570d7ae5292e2f

    • SHA1

      92b59df3ba9a21568416efe8c6724333f42864e3

    • SHA256

      9a203b90ac6e81f7368115e2ef687807c8293c2886c453d4d10bd9cd39344d30

    • SHA512

      d4768dbbd03c403cff50baa9272eb46a65ed32a29d4681d58e12cad9db75b5598b466042b208904861d7a55ae4a0c65872463d3e240e43fb2279faeaab309a8a

    • SSDEEP

      3072:jwmePjkNoEeF/DKoHGfsm/bvVx+EBpbxdCKGKl8SsO:QjkNXqY/D+qpXQKxsO

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks