General

  • Target

    JaffaCakes118_39fa8d89a812e0477b7af0b7d0b81bac

  • Size

    328KB

  • Sample

    250126-25zbfaykez

  • MD5

    39fa8d89a812e0477b7af0b7d0b81bac

  • SHA1

    e53cff753e2f35b5f6a27160e0875b0f79b6c960

  • SHA256

    36c89ffcfd8e000c288bb4f36333f8f3fab449dcf55008248d7956ab8c3e3b60

  • SHA512

    b491825c79a1b2862116c4c4ad9e0244ea6ed1e4a810755685d248f6badb3cb5d6250d651ba5df9e649cd455efde4c889992f7193ab7eb389a5ae2eb04bed091

  • SSDEEP

    6144:+PPImeAWlrnYR82C3DjIrYW6RX3ub9hRxaC/Tgv4fx1WaD:oAmeAWlTYyp3Djp5XebLHTkoWaD

Malware Config

Targets

    • Target

      JaffaCakes118_39fa8d89a812e0477b7af0b7d0b81bac

    • Size

      328KB

    • MD5

      39fa8d89a812e0477b7af0b7d0b81bac

    • SHA1

      e53cff753e2f35b5f6a27160e0875b0f79b6c960

    • SHA256

      36c89ffcfd8e000c288bb4f36333f8f3fab449dcf55008248d7956ab8c3e3b60

    • SHA512

      b491825c79a1b2862116c4c4ad9e0244ea6ed1e4a810755685d248f6badb3cb5d6250d651ba5df9e649cd455efde4c889992f7193ab7eb389a5ae2eb04bed091

    • SSDEEP

      6144:+PPImeAWlrnYR82C3DjIrYW6RX3ub9hRxaC/Tgv4fx1WaD:oAmeAWlTYyp3Djp5XebLHTkoWaD

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Isrstealer family

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks