General

  • Target

    JaffaCakes118_5119b8df58fae088f338fb83d9a2b3bc

  • Size

    933KB

  • Sample

    250129-bfktmsyqfl

  • MD5

    5119b8df58fae088f338fb83d9a2b3bc

  • SHA1

    5d6ffd11b68784c6342dc03a044fea4f2550ee1f

  • SHA256

    936daa7b23217158833c1e1b9b05a1ebfb07caa12ad53d11481f2c510f30d6fb

  • SHA512

    83a0df00d54c89d5f624a211a8f84d421e57d452dd8aa9439822ca218835f8980d149eb392d2adae4064f8a0cafeb2e9c9c46b32c9130b00ee93e0eb1a592e88

  • SSDEEP

    12288:ApegXVGSgu10Vdx2mT0tL5kDrPrIrpJl3FbONGNT19Himy8H4CNjGzwUOOUjjoKc:AZsSaQ4PAZ2CJxHjjohNb4i

Malware Config

Targets

    • Target

      JaffaCakes118_5119b8df58fae088f338fb83d9a2b3bc

    • Size

      933KB

    • MD5

      5119b8df58fae088f338fb83d9a2b3bc

    • SHA1

      5d6ffd11b68784c6342dc03a044fea4f2550ee1f

    • SHA256

      936daa7b23217158833c1e1b9b05a1ebfb07caa12ad53d11481f2c510f30d6fb

    • SHA512

      83a0df00d54c89d5f624a211a8f84d421e57d452dd8aa9439822ca218835f8980d149eb392d2adae4064f8a0cafeb2e9c9c46b32c9130b00ee93e0eb1a592e88

    • SSDEEP

      12288:ApegXVGSgu10Vdx2mT0tL5kDrPrIrpJl3FbONGNT19Himy8H4CNjGzwUOOUjjoKc:AZsSaQ4PAZ2CJxHjjohNb4i

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Isrstealer family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks