General

  • Target

    e4ee7aca896a25d25a15e027c1f57b49_JaffaCakes118

  • Size

    480KB

  • Sample

    240916-rdta1a1fjf

  • MD5

    e4ee7aca896a25d25a15e027c1f57b49

  • SHA1

    fd92668749575773ab56e435a96a8029431e2897

  • SHA256

    22e2af8ed2016a8eea1bd1e331e06a58f251ce6a470c657157e1c4c3f33bdb99

  • SHA512

    b3fc31b21bf0b9938cc1b76840b1741ca0c21f9fd0340e39fd1866b28002b6be33d66705040d0cc1cde1622858fd13f63581a106c629998103cda0c61802ef82

  • SSDEEP

    12288:jx9bxAtPcU6YEo48WgxFOMKefOrVJ6Hw8z/lwiUov:jx9b2tcnYEo3zybefcJR8z/lwiUo

Malware Config

Targets

    • Target

      e4ee7aca896a25d25a15e027c1f57b49_JaffaCakes118

    • Size

      480KB

    • MD5

      e4ee7aca896a25d25a15e027c1f57b49

    • SHA1

      fd92668749575773ab56e435a96a8029431e2897

    • SHA256

      22e2af8ed2016a8eea1bd1e331e06a58f251ce6a470c657157e1c4c3f33bdb99

    • SHA512

      b3fc31b21bf0b9938cc1b76840b1741ca0c21f9fd0340e39fd1866b28002b6be33d66705040d0cc1cde1622858fd13f63581a106c629998103cda0c61802ef82

    • SSDEEP

      12288:jx9bxAtPcU6YEo48WgxFOMKefOrVJ6Hw8z/lwiUov:jx9b2tcnYEo3zybefcJR8z/lwiUo

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks