Malware Analysis Report

2024-10-19 10:27

Sample ID 240410-jyepcaha44
Target ea9d25a8f709b6c6fe43f99a2de1f41a_JaffaCakes118
SHA256 13bfd10f4b7b3902350fc6d34caf446cc137114648f2016bf471bbecdd4dc80f
Tags
isrstealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

13bfd10f4b7b3902350fc6d34caf446cc137114648f2016bf471bbecdd4dc80f

Threat Level: Known bad

The file ea9d25a8f709b6c6fe43f99a2de1f41a_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

isrstealer

ISR Stealer payload

Isrstealer family

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-04-10 08:04

Signatures

ISR Stealer payload

Description Indicator Process Target
N/A N/A N/A N/A

Isrstealer family

isrstealer

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-10 08:04

Reported

2024-04-10 08:04

Platform

win7-20240221-en

Max time kernel

3s

Max time network

5s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-10 08:04

Reported

2024-04-10 08:04

Platform

win10v2004-20240226-en

Max time kernel

0s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 8.8.8.8:53 udp

Files

N/A