General

  • Target

    dd6be2e0ab2b452c0bc2fcb6b94fee0c_JaffaCakes118

  • Size

    856KB

  • Sample

    240913-b1cc1axbkq

  • MD5

    dd6be2e0ab2b452c0bc2fcb6b94fee0c

  • SHA1

    a1e5f186f8ab455dd4f1d3a60da4f0b15796ab6d

  • SHA256

    9c8771043260dbeb24da0d14000661c25ca9a30331dd6529299ae0d151c67e28

  • SHA512

    15095661fb48a75edc504fc7c422205d679610d6d87a99381f27577ef38b208da156102c4900d581dc90f985e08a095d981de89e2bb896afb7c2a92ea5cf902a

  • SSDEEP

    12288:jCybN1pc3UXbEuUINaK7VsQ7DvyNEQc8pha544sCTtH7Pyn0e0WeLDTqSwBqHui:jCyjRNaK7Vf77iEQjIDF76lneLD+5vi

Malware Config

Targets

    • Target

      dd6be2e0ab2b452c0bc2fcb6b94fee0c_JaffaCakes118

    • Size

      856KB

    • MD5

      dd6be2e0ab2b452c0bc2fcb6b94fee0c

    • SHA1

      a1e5f186f8ab455dd4f1d3a60da4f0b15796ab6d

    • SHA256

      9c8771043260dbeb24da0d14000661c25ca9a30331dd6529299ae0d151c67e28

    • SHA512

      15095661fb48a75edc504fc7c422205d679610d6d87a99381f27577ef38b208da156102c4900d581dc90f985e08a095d981de89e2bb896afb7c2a92ea5cf902a

    • SSDEEP

      12288:jCybN1pc3UXbEuUINaK7VsQ7DvyNEQc8pha544sCTtH7Pyn0e0WeLDTqSwBqHui:jCyjRNaK7Vf77iEQjIDF76lneLD+5vi

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks