General

  • Target

    02be4a5cf4743e305d6cb0498277833e_JaffaCakes118

  • Size

    337KB

  • Sample

    240930-w8tmgatcre

  • MD5

    02be4a5cf4743e305d6cb0498277833e

  • SHA1

    d0a650443c767c1b7ddca88e9e430ea009f83e7e

  • SHA256

    a52ac716cc69375814d98ffba09cbeb6b50a322bc9499196b16fda2ac84b819a

  • SHA512

    57ad5e53a02035868d9b5bb95c0490308eb776b2b4c5c4829796e49cd7b84854140061bc06f3f57bed74554d592d33c87e21057490567ff2b52771bbf2b01bd1

  • SSDEEP

    6144:MCZpnhRNGkAb6oOV+7eSEUPZwRRC0ZyHKzLmqbed/+s2TLVlOlebZmbcfTl:rXnhR66QC4hwR7zSAoZ2TLVUleMwfTl

Malware Config

Targets

    • Target

      XVCU Keygen/keygen.exe

    • Size

      424KB

    • MD5

      8bdf1e56943249066a5300ddd31d3b3b

    • SHA1

      89c07ee977b21595039ad7a7ee94dfb41868a23f

    • SHA256

      5a6c4407831f1e2dfcefeec9d8062087a3335387757c07da0f8bcbc838929182

    • SHA512

      a180592c084b107f81f807eeed908575faae718ad57129800d0e683f98a09f701f7982dde2e8766bc6500b407005d8a340d03e3aab04351f9e0633b11c534cc2

    • SSDEEP

      12288:17J7YiFAI1E/vzM9NsNBB+j+qTangZ3M7h9tcnd7OnTppl:1OiFA4EfBB+tYgZ3M7h9todKTL

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks