General

  • Target

    ef7c6cf6805e5a2f7ffac43da977e4c8_JaffaCakes118

  • Size

    5.9MB

  • Sample

    240921-k87njsvdjb

  • MD5

    ef7c6cf6805e5a2f7ffac43da977e4c8

  • SHA1

    811b43c06d58dcaf9ee4f5e62e2ec834104c1293

  • SHA256

    93ef7eb19d5707f86cfae9a0129662ef09ad32897bb4fe3981c09a193ab9b056

  • SHA512

    e2726e3d463f09bdcfd176c6a77479d186dcaea25ca5bd92dfa93e3093c1c64e3362fccf58fb0ce53bff47fa6bc68d0d577a9d7af43a653b65743ddfd8bd64b1

  • SSDEEP

    6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

Malware Config

Targets

    • Target

      ef7c6cf6805e5a2f7ffac43da977e4c8_JaffaCakes118

    • Size

      5.9MB

    • MD5

      ef7c6cf6805e5a2f7ffac43da977e4c8

    • SHA1

      811b43c06d58dcaf9ee4f5e62e2ec834104c1293

    • SHA256

      93ef7eb19d5707f86cfae9a0129662ef09ad32897bb4fe3981c09a193ab9b056

    • SHA512

      e2726e3d463f09bdcfd176c6a77479d186dcaea25ca5bd92dfa93e3093c1c64e3362fccf58fb0ce53bff47fa6bc68d0d577a9d7af43a653b65743ddfd8bd64b1

    • SSDEEP

      6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks