General

  • Target

    f2aba5d2e89df152fb6e8dc296725e96_JaffaCakes118

  • Size

    383KB

  • Sample

    240923-tzy5gssgmp

  • MD5

    f2aba5d2e89df152fb6e8dc296725e96

  • SHA1

    1a6c7a2d6cf519e50a1c3b79380eba5c122024ee

  • SHA256

    3d2d9c5b0eb236855f300b3f5e5ac81236ee6f0df1a8cb9cbab461b296930316

  • SHA512

    22cd91a5dc70533d260e1d6b0eb80d54b5cbb2183b6a3da6f1b894b64b6e0e4efcb9b17d0166087931f32a5b384b4f752c471bacf2f2a02ec98e259bb7d1bebe

  • SSDEEP

    6144:nZqi90eTTUxWwog5Df18LZTelTNqPQ4KNSZEePRttaB693aafQoBuixwlZDTxP07:nZZ90eTNwog5D+LBSTNWQ4+SZEmnaB6J

Malware Config

Targets

    • Target

      f2aba5d2e89df152fb6e8dc296725e96_JaffaCakes118

    • Size

      383KB

    • MD5

      f2aba5d2e89df152fb6e8dc296725e96

    • SHA1

      1a6c7a2d6cf519e50a1c3b79380eba5c122024ee

    • SHA256

      3d2d9c5b0eb236855f300b3f5e5ac81236ee6f0df1a8cb9cbab461b296930316

    • SHA512

      22cd91a5dc70533d260e1d6b0eb80d54b5cbb2183b6a3da6f1b894b64b6e0e4efcb9b17d0166087931f32a5b384b4f752c471bacf2f2a02ec98e259bb7d1bebe

    • SSDEEP

      6144:nZqi90eTTUxWwog5Df18LZTelTNqPQ4KNSZEePRttaB693aafQoBuixwlZDTxP07:nZZ90eTNwog5D+LBSTNWQ4+SZEmnaB6J

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.