General

  • Target

    e2bcb03f71902945d00c6ba97d91ecb1_JaffaCakes118

  • Size

    4.3MB

  • Sample

    240915-r6t31aycqg

  • MD5

    e2bcb03f71902945d00c6ba97d91ecb1

  • SHA1

    074ae4743c0dc9996a58ae0cb6e66bfd12577c4e

  • SHA256

    4dbb1e50e56ab5e6f8053fbed26c7c8315b38d4b77ee61e8d469836c6024112e

  • SHA512

    a0507116a71b0a91876aa87bcea667c0a181797cb1dbbcaec4c2492ed9d356bb3f0e8c60db742605f4f4d64979d5129f0e3ce72129b93a28db091f91da6e3ff2

  • SSDEEP

    6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

Malware Config

Targets

    • Target

      e2bcb03f71902945d00c6ba97d91ecb1_JaffaCakes118

    • Size

      4.3MB

    • MD5

      e2bcb03f71902945d00c6ba97d91ecb1

    • SHA1

      074ae4743c0dc9996a58ae0cb6e66bfd12577c4e

    • SHA256

      4dbb1e50e56ab5e6f8053fbed26c7c8315b38d4b77ee61e8d469836c6024112e

    • SHA512

      a0507116a71b0a91876aa87bcea667c0a181797cb1dbbcaec4c2492ed9d356bb3f0e8c60db742605f4f4d64979d5129f0e3ce72129b93a28db091f91da6e3ff2

    • SSDEEP

      6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks