General

  • Target

    f2aba5d2e89df152fb6e8dc296725e96_JaffaCakes118

  • Size

    383KB

  • Sample

    240923-tzy5gssgmp

  • MD5

    f2aba5d2e89df152fb6e8dc296725e96

  • SHA1

    1a6c7a2d6cf519e50a1c3b79380eba5c122024ee

  • SHA256

    3d2d9c5b0eb236855f300b3f5e5ac81236ee6f0df1a8cb9cbab461b296930316

  • SHA512

    22cd91a5dc70533d260e1d6b0eb80d54b5cbb2183b6a3da6f1b894b64b6e0e4efcb9b17d0166087931f32a5b384b4f752c471bacf2f2a02ec98e259bb7d1bebe

  • SSDEEP

    6144:nZqi90eTTUxWwog5Df18LZTelTNqPQ4KNSZEePRttaB693aafQoBuixwlZDTxP07:nZZ90eTNwog5D+LBSTNWQ4+SZEmnaB6J

Malware Config

Targets

    • Target

      f2aba5d2e89df152fb6e8dc296725e96_JaffaCakes118

    • Size

      383KB

    • MD5

      f2aba5d2e89df152fb6e8dc296725e96

    • SHA1

      1a6c7a2d6cf519e50a1c3b79380eba5c122024ee

    • SHA256

      3d2d9c5b0eb236855f300b3f5e5ac81236ee6f0df1a8cb9cbab461b296930316

    • SHA512

      22cd91a5dc70533d260e1d6b0eb80d54b5cbb2183b6a3da6f1b894b64b6e0e4efcb9b17d0166087931f32a5b384b4f752c471bacf2f2a02ec98e259bb7d1bebe

    • SSDEEP

      6144:nZqi90eTTUxWwog5Df18LZTelTNqPQ4KNSZEePRttaB693aafQoBuixwlZDTxP07:nZZ90eTNwog5D+LBSTNWQ4+SZEmnaB6J

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks