General

  • Target

    a2c6eb6be849b063bc45e9114f543888_JaffaCakes118

  • Size

    277KB

  • Sample

    241126-s65eeaxnaz

  • MD5

    a2c6eb6be849b063bc45e9114f543888

  • SHA1

    17ad7e00b27ff6605d6c9cc92e484de180fd0289

  • SHA256

    3b72f46088f0554ee89a08507ff0695acad9c555d0f3a3858d969723cd592ac4

  • SHA512

    4c77568c10d1774c5623eeb94e1c5141032c44c6629f3f91a77fe0e8c13a758be1d117f872de338fbf30bdce7cd9aa17b41f60482d3e04e1bf9d3e7253b593ee

  • SSDEEP

    6144:eH0PQIW7BYcZ8jUbG5p60lM3OTS7SON/x9+jAWe6OlYmfm:eUP+F08GWiwjYmu

Malware Config

Targets

    • Target

      a2c6eb6be849b063bc45e9114f543888_JaffaCakes118

    • Size

      277KB

    • MD5

      a2c6eb6be849b063bc45e9114f543888

    • SHA1

      17ad7e00b27ff6605d6c9cc92e484de180fd0289

    • SHA256

      3b72f46088f0554ee89a08507ff0695acad9c555d0f3a3858d969723cd592ac4

    • SHA512

      4c77568c10d1774c5623eeb94e1c5141032c44c6629f3f91a77fe0e8c13a758be1d117f872de338fbf30bdce7cd9aa17b41f60482d3e04e1bf9d3e7253b593ee

    • SSDEEP

      6144:eH0PQIW7BYcZ8jUbG5p60lM3OTS7SON/x9+jAWe6OlYmfm:eUP+F08GWiwjYmu

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Isrstealer family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks