General

  • Target

    e9c07190ade75653f4a326dcc7f13f22_JaffaCakes118

  • Size

    340KB

  • Sample

    241213-ed2k6ayrhn

  • MD5

    e9c07190ade75653f4a326dcc7f13f22

  • SHA1

    16cf44a3d85d85d62e81663a9c5e48a8aeb68f73

  • SHA256

    3b94b6e3b2d3de48117fb810687c9491dccab5502661ae0d201082e35db51226

  • SHA512

    3725ca00e47270898b9319e1900dc1d9a2b4038bf4db145b3fae85ac47aaab720a69b51c0f828aceb63745b7731cd49ccec04ba1db109519daecb653dfedaf11

  • SSDEEP

    6144:6I2BQGdlBDX8nz7PmyTFlsViWBNgQ4HpLnkCHaXyooS:92aGZDWXPtTFeEYCXJLPaXyooS

Malware Config

Targets

    • Target

      e9c07190ade75653f4a326dcc7f13f22_JaffaCakes118

    • Size

      340KB

    • MD5

      e9c07190ade75653f4a326dcc7f13f22

    • SHA1

      16cf44a3d85d85d62e81663a9c5e48a8aeb68f73

    • SHA256

      3b94b6e3b2d3de48117fb810687c9491dccab5502661ae0d201082e35db51226

    • SHA512

      3725ca00e47270898b9319e1900dc1d9a2b4038bf4db145b3fae85ac47aaab720a69b51c0f828aceb63745b7731cd49ccec04ba1db109519daecb653dfedaf11

    • SSDEEP

      6144:6I2BQGdlBDX8nz7PmyTFlsViWBNgQ4HpLnkCHaXyooS:92aGZDWXPtTFeEYCXJLPaXyooS

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Isrstealer family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks