General

  • Target

    34c4d20e314fd1d4e7ceb709e4aae5fc_JaffaCakes118

  • Size

    521KB

  • Sample

    241011-pkxwnasapf

  • MD5

    34c4d20e314fd1d4e7ceb709e4aae5fc

  • SHA1

    d9cdd195c35c424e4fa209e3a6a3563fcff25aef

  • SHA256

    e93c62f6504891ddf042b0a0509e5107fb1227a76f9c98bf829b84980c34044b

  • SHA512

    c07731c7a8bafdeb4710971146c8f8983d411971ef01d077ee1dd9f1f95a91fae38337964b935a8d88ca104fdc259048b427b58a0d96ec2e687a84d6abc2cef9

  • SSDEEP

    6144:aT5OEpgULTc0J36XgbQpV8TniqCy759sXokF2fn5aHBca87QZbEI7fLZAmq:kEEpBu/K59gokF2fXE7+

Malware Config

Targets

    • Target

      34c4d20e314fd1d4e7ceb709e4aae5fc_JaffaCakes118

    • Size

      521KB

    • MD5

      34c4d20e314fd1d4e7ceb709e4aae5fc

    • SHA1

      d9cdd195c35c424e4fa209e3a6a3563fcff25aef

    • SHA256

      e93c62f6504891ddf042b0a0509e5107fb1227a76f9c98bf829b84980c34044b

    • SHA512

      c07731c7a8bafdeb4710971146c8f8983d411971ef01d077ee1dd9f1f95a91fae38337964b935a8d88ca104fdc259048b427b58a0d96ec2e687a84d6abc2cef9

    • SSDEEP

      6144:aT5OEpgULTc0J36XgbQpV8TniqCy759sXokF2fn5aHBca87QZbEI7fLZAmq:kEEpBu/K59gokF2fXE7+

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks