General

  • Target

    e9cf8e1b64add31f221d25e33f4deaed_JaffaCakes118

  • Size

    4.3MB

  • Sample

    240918-x1n8fsydne

  • MD5

    e9cf8e1b64add31f221d25e33f4deaed

  • SHA1

    ed615268f7b3858808458f1bec209facdfcdd5b7

  • SHA256

    dd4b08458519d8396e116bc4971a8181a0e2977776070e958f5c9d74e16b48b8

  • SHA512

    d6c46dbfacf18ecc1f5dde7899be6207747de24b90d540d17116e4617847df2bef700b166d572604dbc911d923bffc2fb252e2e0a605456af2026cf34b5dd400

  • SSDEEP

    6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

Malware Config

Targets

    • Target

      e9cf8e1b64add31f221d25e33f4deaed_JaffaCakes118

    • Size

      4.3MB

    • MD5

      e9cf8e1b64add31f221d25e33f4deaed

    • SHA1

      ed615268f7b3858808458f1bec209facdfcdd5b7

    • SHA256

      dd4b08458519d8396e116bc4971a8181a0e2977776070e958f5c9d74e16b48b8

    • SHA512

      d6c46dbfacf18ecc1f5dde7899be6207747de24b90d540d17116e4617847df2bef700b166d572604dbc911d923bffc2fb252e2e0a605456af2026cf34b5dd400

    • SSDEEP

      6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks