General

  • Target

    bb266dc5dede36e0d96e4f55b76f016e_JaffaCakes118

  • Size

    1.5MB

  • Sample

    241203-b4g3nayrgp

  • MD5

    bb266dc5dede36e0d96e4f55b76f016e

  • SHA1

    4d17702da9f5548e4673081f84b13298c0949fc0

  • SHA256

    7be45f5f89a98f22c8cd858540497c5da3dba7cbec0fc49b4ec6eff435ee317f

  • SHA512

    f139ce61dfcbb51a7d3a947976d5e2600b2875faafd2c7fdcf6791db45546b46b34f9634bba406e1380343d288e707251921ea350d97079522662ac4a01bbf98

  • SSDEEP

    24576:PKnGctxx3lwkjQ7h3l1PVXUi9VF0tb5xQbn1wcJCRcsawHLkH7XgRbeZ:PK3v3a77xVLjF8Fx2n1wpRcsjHLkrz

Malware Config

Targets

    • Target

      bb266dc5dede36e0d96e4f55b76f016e_JaffaCakes118

    • Size

      1.5MB

    • MD5

      bb266dc5dede36e0d96e4f55b76f016e

    • SHA1

      4d17702da9f5548e4673081f84b13298c0949fc0

    • SHA256

      7be45f5f89a98f22c8cd858540497c5da3dba7cbec0fc49b4ec6eff435ee317f

    • SHA512

      f139ce61dfcbb51a7d3a947976d5e2600b2875faafd2c7fdcf6791db45546b46b34f9634bba406e1380343d288e707251921ea350d97079522662ac4a01bbf98

    • SSDEEP

      24576:PKnGctxx3lwkjQ7h3l1PVXUi9VF0tb5xQbn1wcJCRcsawHLkH7XgRbeZ:PK3v3a77xVLjF8Fx2n1wpRcsjHLkrz

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Isrstealer family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks