General

  • Target

    JaffaCakes118_7a7cc0779765897b4d2d2ddb03994240

  • Size

    875KB

  • Sample

    250104-s4jd6avrdx

  • MD5

    7a7cc0779765897b4d2d2ddb03994240

  • SHA1

    b54fc72f7181f0ba97be0383a85109b48a387a68

  • SHA256

    0983fff2745c1a77e38e4409d6997148fa2f45e0ed0cc17dd62f2fea9d8be83e

  • SHA512

    e10fcb683a9d508920916fa30c59bc39c5119a6fb4cbc0b7ed1e91ea04c60aea1523d9e718e31d758cf78749d8dac524154dfcbaaff3de2c0d96b1fc1ae9bc02

  • SSDEEP

    12288:+7FbjxMxXS3psW69K0JPMXS5qarnC9ppVua4H3HYEf7Fbjxx:IHLsWGK0JiS5NrnC9pLuaQzH7

Malware Config

Targets

    • Target

      JaffaCakes118_7a7cc0779765897b4d2d2ddb03994240

    • Size

      875KB

    • MD5

      7a7cc0779765897b4d2d2ddb03994240

    • SHA1

      b54fc72f7181f0ba97be0383a85109b48a387a68

    • SHA256

      0983fff2745c1a77e38e4409d6997148fa2f45e0ed0cc17dd62f2fea9d8be83e

    • SHA512

      e10fcb683a9d508920916fa30c59bc39c5119a6fb4cbc0b7ed1e91ea04c60aea1523d9e718e31d758cf78749d8dac524154dfcbaaff3de2c0d96b1fc1ae9bc02

    • SSDEEP

      12288:+7FbjxMxXS3psW69K0JPMXS5qarnC9ppVua4H3HYEf7Fbjxx:IHLsWGK0JiS5NrnC9pLuaQzH7

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Isrstealer family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks