General

  • Target

    8269b1107aeefdb83374ecc9149878f5_JaffaCakes118

  • Size

    269KB

  • Sample

    241031-jz9acavaqb

  • MD5

    8269b1107aeefdb83374ecc9149878f5

  • SHA1

    274e6dabe1574074fc4303167030fd21d184789e

  • SHA256

    7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c

  • SHA512

    f16f8c9812fd1b56093882f9d8d3bdcabb43d1fbdcedbfe6bd83cf820316a7b772a913d5a6ce61957c676f6057f9aac614a072bcbdd320c8b52379d937949b3b

  • SSDEEP

    6144:BP8ilqgFAjN98/Un8Ple1evMigXAuQoYE1R:BP8ilPKROs8JvNgXBQPE1

Malware Config

Targets

    • Target

      8269b1107aeefdb83374ecc9149878f5_JaffaCakes118

    • Size

      269KB

    • MD5

      8269b1107aeefdb83374ecc9149878f5

    • SHA1

      274e6dabe1574074fc4303167030fd21d184789e

    • SHA256

      7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c

    • SHA512

      f16f8c9812fd1b56093882f9d8d3bdcabb43d1fbdcedbfe6bd83cf820316a7b772a913d5a6ce61957c676f6057f9aac614a072bcbdd320c8b52379d937949b3b

    • SSDEEP

      6144:BP8ilqgFAjN98/Un8Ple1evMigXAuQoYE1R:BP8ilPKROs8JvNgXBQPE1

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Isrstealer family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks