General

  • Target

    dd3352212bf53f2669e338ae7e6e39f7_JaffaCakes118

  • Size

    508KB

  • Sample

    240912-2yxh9szdrl

  • MD5

    dd3352212bf53f2669e338ae7e6e39f7

  • SHA1

    657ec2164d316cfcecafcfd6d04feb6318cc6542

  • SHA256

    29d641c9584590971572e317560b6d8a55779c14733ecfd68565996e58c5ef3a

  • SHA512

    a4414fa081ed28f98385faeb2dbc9ad8abe01865e9233f3017019314c2332f0f19b92215b6c218d61ecaa290ea7f4799771f92152469387d4bfc8925550112e1

  • SSDEEP

    12288:t6CyJY9XMgAyb8kT2mU6K1l4c0944rRChta16C1kupc:9yQX7b8kATn4c09NJ1Hpc

Malware Config

Targets

    • Target

      dd3352212bf53f2669e338ae7e6e39f7_JaffaCakes118

    • Size

      508KB

    • MD5

      dd3352212bf53f2669e338ae7e6e39f7

    • SHA1

      657ec2164d316cfcecafcfd6d04feb6318cc6542

    • SHA256

      29d641c9584590971572e317560b6d8a55779c14733ecfd68565996e58c5ef3a

    • SHA512

      a4414fa081ed28f98385faeb2dbc9ad8abe01865e9233f3017019314c2332f0f19b92215b6c218d61ecaa290ea7f4799771f92152469387d4bfc8925550112e1

    • SSDEEP

      12288:t6CyJY9XMgAyb8kT2mU6K1l4c0944rRChta16C1kupc:9yQX7b8kATn4c09NJ1Hpc

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks