General

  • Target

    f39c9a2e23e3f3119efe4698d26b9f53_JaffaCakes118

  • Size

    140KB

  • Sample

    240924-pck7wsthqm

  • MD5

    f39c9a2e23e3f3119efe4698d26b9f53

  • SHA1

    def8046d2bd2da6a2d40061454400d6ce5c5d4af

  • SHA256

    a2228653372c172284e73ccc2ea18b4634eae8a9c352a2fca22c33131bbf8618

  • SHA512

    8ffe5de645e4357139fb1987b31c04542c646442212ad80d090bd20155c35008c9e847e83072a164f5ca1481881f4a36ff651eb35d3716e519ee608cbcdceae5

  • SSDEEP

    1536:xxwQevvSjfQ2QOE/baP/8bUxwYgv16oxgyKELV5ANMz/9NEjT8NjOO8k:PiYOBTanXgvvKELVBYjT8z8k

Malware Config

Targets

    • Target

      f39c9a2e23e3f3119efe4698d26b9f53_JaffaCakes118

    • Size

      140KB

    • MD5

      f39c9a2e23e3f3119efe4698d26b9f53

    • SHA1

      def8046d2bd2da6a2d40061454400d6ce5c5d4af

    • SHA256

      a2228653372c172284e73ccc2ea18b4634eae8a9c352a2fca22c33131bbf8618

    • SHA512

      8ffe5de645e4357139fb1987b31c04542c646442212ad80d090bd20155c35008c9e847e83072a164f5ca1481881f4a36ff651eb35d3716e519ee608cbcdceae5

    • SSDEEP

      1536:xxwQevvSjfQ2QOE/baP/8bUxwYgv16oxgyKELV5ANMz/9NEjT8NjOO8k:PiYOBTanXgvvKELVBYjT8z8k

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks