General

  • Target

    2308d3630fa484e5b6788ce53c27e110_JaffaCakes118

  • Size

    430KB

  • Sample

    241008-wh8npsydrm

  • MD5

    2308d3630fa484e5b6788ce53c27e110

  • SHA1

    bf12b6af3550d5702eb0f2bc4b6edc67ac405122

  • SHA256

    797655701398c216d4a480d7833b4056f5310fd982a33e2cb82d6996c2caad01

  • SHA512

    25b6b0726e5b07f6407a5aa012577788e6a95f6121f4e1c84c731997a9602388a7a06b958ee425966f761c8112d70d00f79d77d44c68261708f3433d5bbe0395

  • SSDEEP

    12288:bgYBNfEbQcSRBrqKgJq39UWlb/pzepGnW:bXBALjU9DrewnW

Malware Config

Targets

    • Target

      2308d3630fa484e5b6788ce53c27e110_JaffaCakes118

    • Size

      430KB

    • MD5

      2308d3630fa484e5b6788ce53c27e110

    • SHA1

      bf12b6af3550d5702eb0f2bc4b6edc67ac405122

    • SHA256

      797655701398c216d4a480d7833b4056f5310fd982a33e2cb82d6996c2caad01

    • SHA512

      25b6b0726e5b07f6407a5aa012577788e6a95f6121f4e1c84c731997a9602388a7a06b958ee425966f761c8112d70d00f79d77d44c68261708f3433d5bbe0395

    • SSDEEP

      12288:bgYBNfEbQcSRBrqKgJq39UWlb/pzepGnW:bXBALjU9DrewnW

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks