General

  • Target

    e24bfc0ca45f6c4ea4ba0e9ca10dcae4_JaffaCakes118

  • Size

    6.0MB

  • Sample

    240915-ms56wszckg

  • MD5

    e24bfc0ca45f6c4ea4ba0e9ca10dcae4

  • SHA1

    4cad40279cd1fcbfb0d21fa36de727eb6a1897a9

  • SHA256

    719c8f939f7851f8d6e37cd6d6d68eb9f4b8b681c5812037f0dc159a0f7c8ae1

  • SHA512

    3d0b55a5f2046a1e54a2a5637e30d510c03b704f78dfb653e7ecddec61e9d023b2e314766075126739a5238414e15a9c4484ef2a4a781584b6916faec53d530c

  • SSDEEP

    6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

Malware Config

Targets

    • Target

      e24bfc0ca45f6c4ea4ba0e9ca10dcae4_JaffaCakes118

    • Size

      6.0MB

    • MD5

      e24bfc0ca45f6c4ea4ba0e9ca10dcae4

    • SHA1

      4cad40279cd1fcbfb0d21fa36de727eb6a1897a9

    • SHA256

      719c8f939f7851f8d6e37cd6d6d68eb9f4b8b681c5812037f0dc159a0f7c8ae1

    • SHA512

      3d0b55a5f2046a1e54a2a5637e30d510c03b704f78dfb653e7ecddec61e9d023b2e314766075126739a5238414e15a9c4484ef2a4a781584b6916faec53d530c

    • SSDEEP

      6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks