General

  • Target

    JaffaCakes118_7bddbb6e8ef452ccfae39772e1e65611

  • Size

    260KB

  • Sample

    250104-1fnmzazqfq

  • MD5

    7bddbb6e8ef452ccfae39772e1e65611

  • SHA1

    9be5b0d96f4a8bfe0e64e4f05e3ce2ed9eebc6c7

  • SHA256

    f523c4ef34854da34a4dd80ffe9019b856b5343d59ab4039df9505fb73f747d5

  • SHA512

    2d981618b7c3011d594b9e315107f3ad209932d613ed9aa120c96cad99bf34bfc4404ddf9c2230ac3d8247c151ffe9f4846de2e7fc15d5d1514bf8ebf405efb6

  • SSDEEP

    6144:vYb//1PxwMdIKCC0ef//uXltKc+LVsz9b8R4jvLXou:FMdFeCXuLKcCVsz6SDLXo

Malware Config

Targets

    • Target

      JaffaCakes118_7bddbb6e8ef452ccfae39772e1e65611

    • Size

      260KB

    • MD5

      7bddbb6e8ef452ccfae39772e1e65611

    • SHA1

      9be5b0d96f4a8bfe0e64e4f05e3ce2ed9eebc6c7

    • SHA256

      f523c4ef34854da34a4dd80ffe9019b856b5343d59ab4039df9505fb73f747d5

    • SHA512

      2d981618b7c3011d594b9e315107f3ad209932d613ed9aa120c96cad99bf34bfc4404ddf9c2230ac3d8247c151ffe9f4846de2e7fc15d5d1514bf8ebf405efb6

    • SSDEEP

      6144:vYb//1PxwMdIKCC0ef//uXltKc+LVsz9b8R4jvLXou:FMdFeCXuLKcCVsz6SDLXo

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • Isrstealer family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks