General

  • Target

    e67bc886e8798b8be7e70ef019905f1e_JaffaCakes118

  • Size

    236KB

  • Sample

    240917-k3s8zavekp

  • MD5

    e67bc886e8798b8be7e70ef019905f1e

  • SHA1

    3b06c51faf0f481ba8ddbb1310b498e91137f914

  • SHA256

    22d26657b04833d870e70a9c23980595771a6cff35fa59f984809ffdfd77a0d0

  • SHA512

    5eefceeb6cb1dc4745e8bbb3641a3222011440bdf471ec63001a5a2688b0098276ee2c8d87da085650e5bf42efed23ec45867f0960d973022238b8b393fce92c

  • SSDEEP

    6144:qnBp3Xn2fG39j/N2UtcyiHbdCmqorFJnSSUl:6p139P07PXrzSSUl

Malware Config

Targets

    • Target

      e67bc886e8798b8be7e70ef019905f1e_JaffaCakes118

    • Size

      236KB

    • MD5

      e67bc886e8798b8be7e70ef019905f1e

    • SHA1

      3b06c51faf0f481ba8ddbb1310b498e91137f914

    • SHA256

      22d26657b04833d870e70a9c23980595771a6cff35fa59f984809ffdfd77a0d0

    • SHA512

      5eefceeb6cb1dc4745e8bbb3641a3222011440bdf471ec63001a5a2688b0098276ee2c8d87da085650e5bf42efed23ec45867f0960d973022238b8b393fce92c

    • SSDEEP

      6144:qnBp3Xn2fG39j/N2UtcyiHbdCmqorFJnSSUl:6p139P07PXrzSSUl

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks