General

  • Target

    JaffaCakes118_6a578b50b62fa21da49e9368b1de3fa0

  • Size

    657KB

  • Sample

    250103-fhhvaasrcl

  • MD5

    6a578b50b62fa21da49e9368b1de3fa0

  • SHA1

    dbbf4a09afb8fd6effe5791b4fd1774f31135768

  • SHA256

    f2acdba3b1e8794ceb3923de7ca8d192f68894e49b37f84fa6723aeb97366d88

  • SHA512

    7cd8a9ef4f346be5d7564863299c43ba1e5abf74ac0547c8e94b98d7ea2ee9996e32c62db3acd1e3d800599089484ea2b65efa547d4c31b0fb26eb0ef8aba803

  • SSDEEP

    12288:d4huhKnDCVjOBi4LGqk2YugOpgxA2jkswofn1aKHjl:dguoDoOInL2Vgogh/ww1

Malware Config

Targets

    • Target

      JaffaCakes118_6a578b50b62fa21da49e9368b1de3fa0

    • Size

      657KB

    • MD5

      6a578b50b62fa21da49e9368b1de3fa0

    • SHA1

      dbbf4a09afb8fd6effe5791b4fd1774f31135768

    • SHA256

      f2acdba3b1e8794ceb3923de7ca8d192f68894e49b37f84fa6723aeb97366d88

    • SHA512

      7cd8a9ef4f346be5d7564863299c43ba1e5abf74ac0547c8e94b98d7ea2ee9996e32c62db3acd1e3d800599089484ea2b65efa547d4c31b0fb26eb0ef8aba803

    • SSDEEP

      12288:d4huhKnDCVjOBi4LGqk2YugOpgxA2jkswofn1aKHjl:dguoDoOInL2Vgogh/ww1

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Isrstealer family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks