General

  • Target

    edeb05bbb74861fae1d5a5825fa6983b_JaffaCakes118

  • Size

    224KB

  • Sample

    240920-s8gq5avcrk

  • MD5

    edeb05bbb74861fae1d5a5825fa6983b

  • SHA1

    1a0e67f666c48d7fecf471132c028b94e7adf9ea

  • SHA256

    89ec5d0f968479ce1cec3e7ed31bf5de92dec4101754a6e27660416bb39d32a5

  • SHA512

    72c223b261e964059507ea8a648d339b9c6e1acb6aa9aad7a82b44e1d0ee7e2449681fe867a362c35cabadf37228b255a13b78baddab087a4331f8a9e46f032c

  • SSDEEP

    3072:d8lk0HvEKFZsDK8auN2Kfji9vCXwFZxzsMaDuyIX4NqIYTDQgfc+lNTFCuNiV39q:dQHvVEKeQBT4N6yIX4N9Y90+ldF/NiV

Malware Config

Targets

    • Target

      edeb05bbb74861fae1d5a5825fa6983b_JaffaCakes118

    • Size

      224KB

    • MD5

      edeb05bbb74861fae1d5a5825fa6983b

    • SHA1

      1a0e67f666c48d7fecf471132c028b94e7adf9ea

    • SHA256

      89ec5d0f968479ce1cec3e7ed31bf5de92dec4101754a6e27660416bb39d32a5

    • SHA512

      72c223b261e964059507ea8a648d339b9c6e1acb6aa9aad7a82b44e1d0ee7e2449681fe867a362c35cabadf37228b255a13b78baddab087a4331f8a9e46f032c

    • SSDEEP

      3072:d8lk0HvEKFZsDK8auN2Kfji9vCXwFZxzsMaDuyIX4NqIYTDQgfc+lNTFCuNiV39q:dQHvVEKeQBT4N6yIX4N9Y90+ldF/NiV

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks