General

  • Target

    40c0f7b8cd328e3c0134bc7ace73276c_JaffaCakes118

  • Size

    841KB

  • Sample

    241013-td2y9ayhjq

  • MD5

    40c0f7b8cd328e3c0134bc7ace73276c

  • SHA1

    ff68428e621a081c85c5669b1c01160b70fcec1f

  • SHA256

    80107993f5db235356aa80d02a1b0111df046d6e825120dba4cab00efaee840e

  • SHA512

    cbcc02e5c056e12ae2a0bb5e794916004d31814a042b9f52b9e6eafb39157a3ac41cbe0e9e554987bf5f8a7850ecb8178947d15892d6744514ac0bde20324a63

  • SSDEEP

    24576:5RmJkcoQricOIQxiZY1iaLcH/Jk57CUJl:WJZoQrbTFZY1iaLDRCUJl

Malware Config

Targets

    • Target

      40c0f7b8cd328e3c0134bc7ace73276c_JaffaCakes118

    • Size

      841KB

    • MD5

      40c0f7b8cd328e3c0134bc7ace73276c

    • SHA1

      ff68428e621a081c85c5669b1c01160b70fcec1f

    • SHA256

      80107993f5db235356aa80d02a1b0111df046d6e825120dba4cab00efaee840e

    • SHA512

      cbcc02e5c056e12ae2a0bb5e794916004d31814a042b9f52b9e6eafb39157a3ac41cbe0e9e554987bf5f8a7850ecb8178947d15892d6744514ac0bde20324a63

    • SSDEEP

      24576:5RmJkcoQricOIQxiZY1iaLcH/Jk57CUJl:WJZoQrbTFZY1iaLDRCUJl

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks