General

  • Target

    216ca65ab4e45f62e1feb9ec72cadaf0_JaffaCakes118

  • Size

    1.5MB

  • Sample

    241008-n7m5as1hma

  • MD5

    216ca65ab4e45f62e1feb9ec72cadaf0

  • SHA1

    4c15261de134999b8ddc318886057fb4ea7517e6

  • SHA256

    cbf4704f11c6d4a57c374d2333f76eacef1d8ed7929a1af1f43ed4e5eaabf958

  • SHA512

    62dfea4e8b38802c9163fddc92904fcfaad70a05310433ec55c6e4d69d014a086f981756d415aeaa9540b399b00b82cc19db096cf563e8045fb986e38fe1694f

  • SSDEEP

    24576:NKoFi8yx1uJVsxu/XvcAcb5UPWbApAQCVZPkTfvAGBQDQYr2bs:NKiiPx1oVsUfcVFU+bApqVebHBQsYC

Malware Config

Targets

    • Target

      216ca65ab4e45f62e1feb9ec72cadaf0_JaffaCakes118

    • Size

      1.5MB

    • MD5

      216ca65ab4e45f62e1feb9ec72cadaf0

    • SHA1

      4c15261de134999b8ddc318886057fb4ea7517e6

    • SHA256

      cbf4704f11c6d4a57c374d2333f76eacef1d8ed7929a1af1f43ed4e5eaabf958

    • SHA512

      62dfea4e8b38802c9163fddc92904fcfaad70a05310433ec55c6e4d69d014a086f981756d415aeaa9540b399b00b82cc19db096cf563e8045fb986e38fe1694f

    • SSDEEP

      24576:NKoFi8yx1uJVsxu/XvcAcb5UPWbApAQCVZPkTfvAGBQDQYr2bs:NKiiPx1oVsUfcVFU+bApqVebHBQsYC

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks