General

  • Target

    eeac2ca0c2d43b8d369bfb99ebbdcb1f_JaffaCakes118

  • Size

    172KB

  • Sample

    240920-3tb77svglr

  • MD5

    eeac2ca0c2d43b8d369bfb99ebbdcb1f

  • SHA1

    38660626a70591184c933608d43bfd748ac4572b

  • SHA256

    096faaf0379fc7d817c6e731c3842e54f041d0e6ce3c459d7ca74ddc3d5473a9

  • SHA512

    a0e3814030d33e1a5955b699a1a591d1551be85b481c6be7bc62270c6dc0cda02231bad196864a0356941096e31e9110f1b5a7c9bcd9e25987d5198e7cd533b2

  • SSDEEP

    3072:T1dlKwgj23+Oz05YoNozt8zShYL2ZU5KrXN0peAer4:T1dlZro5ytSdI2e54

Malware Config

Targets

    • Target

      eeac2ca0c2d43b8d369bfb99ebbdcb1f_JaffaCakes118

    • Size

      172KB

    • MD5

      eeac2ca0c2d43b8d369bfb99ebbdcb1f

    • SHA1

      38660626a70591184c933608d43bfd748ac4572b

    • SHA256

      096faaf0379fc7d817c6e731c3842e54f041d0e6ce3c459d7ca74ddc3d5473a9

    • SHA512

      a0e3814030d33e1a5955b699a1a591d1551be85b481c6be7bc62270c6dc0cda02231bad196864a0356941096e31e9110f1b5a7c9bcd9e25987d5198e7cd533b2

    • SSDEEP

      3072:T1dlKwgj23+Oz05YoNozt8zShYL2ZU5KrXN0peAer4:T1dlZro5ytSdI2e54

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks