General

  • Target

    JaffaCakes118_651b487fd423ec8448f11d23f500ec10

  • Size

    385KB

  • Sample

    250102-ppntjssjcx

  • MD5

    651b487fd423ec8448f11d23f500ec10

  • SHA1

    da43197862d2a936b55f96901d12c87f0db983d8

  • SHA256

    c5f3b728dab3b946f80e363c354d5821d87e67d0d27e2b938bb395e64565ff88

  • SHA512

    bf3508bb2719968aa1b924a073f5e67ac901b26adf1e1b0f834260e3618066cad1aa5029769b539d579408aa80c6c81d07b55328868c778ff50a8ff73dfece1b

  • SSDEEP

    6144:Oex5IamdAAdX+UkKK0r6vpjzWPu9XQRXKJYO3snCo9UJPHmViI:N5IaiAALKmWJWPyXkrksnCWyO

Malware Config

Targets

    • Target

      JaffaCakes118_651b487fd423ec8448f11d23f500ec10

    • Size

      385KB

    • MD5

      651b487fd423ec8448f11d23f500ec10

    • SHA1

      da43197862d2a936b55f96901d12c87f0db983d8

    • SHA256

      c5f3b728dab3b946f80e363c354d5821d87e67d0d27e2b938bb395e64565ff88

    • SHA512

      bf3508bb2719968aa1b924a073f5e67ac901b26adf1e1b0f834260e3618066cad1aa5029769b539d579408aa80c6c81d07b55328868c778ff50a8ff73dfece1b

    • SSDEEP

      6144:Oex5IamdAAdX+UkKK0r6vpjzWPu9XQRXKJYO3snCo9UJPHmViI:N5IaiAALKmWJWPyXkrksnCWyO

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Isrstealer family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks