General

  • Target

    JaffaCakes118_a46ac4796ed318b7db93be19b00cc9d3

  • Size

    312KB

  • Sample

    250205-2gn6kawqdl

  • MD5

    a46ac4796ed318b7db93be19b00cc9d3

  • SHA1

    7e46db664707ad03fcd8edfcfde2351c11335a91

  • SHA256

    94a0098933047c318a0b508e09edc22794f126adcd7946b00dd874cd50405b8e

  • SHA512

    51cf7c3921a96942fb212753dff5c21adc866fb357f9395af6e32ef0b61ba1f459e858494c9c2643917945e89e5b0018c16a4a42b0d5b09fd0837b48272d4f75

  • SSDEEP

    6144:aP2ZAmxWjfP5YVtt85LRDPt7p9WmKzlja5Cl8bIBlq7wi:aPpb5A8BpV99WBw5CKbIIwi

Malware Config

Targets

    • Target

      JaffaCakes118_a46ac4796ed318b7db93be19b00cc9d3

    • Size

      312KB

    • MD5

      a46ac4796ed318b7db93be19b00cc9d3

    • SHA1

      7e46db664707ad03fcd8edfcfde2351c11335a91

    • SHA256

      94a0098933047c318a0b508e09edc22794f126adcd7946b00dd874cd50405b8e

    • SHA512

      51cf7c3921a96942fb212753dff5c21adc866fb357f9395af6e32ef0b61ba1f459e858494c9c2643917945e89e5b0018c16a4a42b0d5b09fd0837b48272d4f75

    • SSDEEP

      6144:aP2ZAmxWjfP5YVtt85LRDPt7p9WmKzlja5Cl8bIBlq7wi:aPpb5A8BpV99WBw5CKbIIwi

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Isrstealer family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks