General

  • Target

    e87a68565079ec9337b38daf24abb7ed_JaffaCakes118

  • Size

    567KB

  • Sample

    241212-1xjqca1jeq

  • MD5

    e87a68565079ec9337b38daf24abb7ed

  • SHA1

    37cc35d9cdf9b1b372c9b6798fc01fa4b320639c

  • SHA256

    0734e46043e3b7a82176386c4c8d5f572fb9673c94d4047a370a25c1035c87ce

  • SHA512

    6f3f6ba6f26f10b942db0d002487f356bdc9045cf312d46a55b7f31343eac9599be43bb8eb2fd35cae9ca3a2fa895384fc88f3d97780fad33d9b866c08c8eb23

  • SSDEEP

    6144:sYLtsu1F9czs6SNy1bveBJIMPlYkZmOgSnMA4Csn7OiiqLIKu3G8qyWg+RB:L1F9czs6WyCJ/PlBnp/mIv3yyW

Malware Config

Targets

    • Target

      e87a68565079ec9337b38daf24abb7ed_JaffaCakes118

    • Size

      567KB

    • MD5

      e87a68565079ec9337b38daf24abb7ed

    • SHA1

      37cc35d9cdf9b1b372c9b6798fc01fa4b320639c

    • SHA256

      0734e46043e3b7a82176386c4c8d5f572fb9673c94d4047a370a25c1035c87ce

    • SHA512

      6f3f6ba6f26f10b942db0d002487f356bdc9045cf312d46a55b7f31343eac9599be43bb8eb2fd35cae9ca3a2fa895384fc88f3d97780fad33d9b866c08c8eb23

    • SSDEEP

      6144:sYLtsu1F9czs6SNy1bveBJIMPlYkZmOgSnMA4Csn7OiiqLIKu3G8qyWg+RB:L1F9czs6WyCJ/PlBnp/mIv3yyW

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Isrstealer family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks