General

  • Target

    JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce

  • Size

    700KB

  • Sample

    250302-mzvnqssrv4

  • MD5

    3fc5b83fa65d7d09f83b9c2f6f60e8ce

  • SHA1

    9215a586003885fd92107ff03dd4f016d460f6fa

  • SHA256

    70313ae036ec75401b0b91ec06330572648a09f5e2a17b54315ea276630f4e2a

  • SHA512

    62a6eafa29e729d87ea9a1b14aa05d2b6dbe596adeea5d76dee82ae9631a9310d4c49f378688f965d08f405a243c4c5b76ca78794eb4385b9d0d17eaf9199ee3

  • SSDEEP

    12288:7hIxtRSqedX/75S9VKMreV5VoxLieB9CtV6tU+YsvqamctoJX4zNvGlEVFxhff:+xtiS9VBebkLCjzEA4zxCSFxhff

Malware Config

Targets

    • Target

      JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce

    • Size

      700KB

    • MD5

      3fc5b83fa65d7d09f83b9c2f6f60e8ce

    • SHA1

      9215a586003885fd92107ff03dd4f016d460f6fa

    • SHA256

      70313ae036ec75401b0b91ec06330572648a09f5e2a17b54315ea276630f4e2a

    • SHA512

      62a6eafa29e729d87ea9a1b14aa05d2b6dbe596adeea5d76dee82ae9631a9310d4c49f378688f965d08f405a243c4c5b76ca78794eb4385b9d0d17eaf9199ee3

    • SSDEEP

      12288:7hIxtRSqedX/75S9VKMreV5VoxLieB9CtV6tU+YsvqamctoJX4zNvGlEVFxhff:+xtiS9VBebkLCjzEA4zxCSFxhff

    • Blackshades

      Blackshades is a remote access trojan with various capabilities.

    • Blackshades family

    • Blackshades payload

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Isrstealer family

    • Modifies firewall policy service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks