General

  • Target

    JaffaCakes118_c779bc7e8de74f93ce8b002a70c55664

  • Size

    1.0MB

  • Sample

    250208-z5fg8atpgs

  • MD5

    c779bc7e8de74f93ce8b002a70c55664

  • SHA1

    f6f23680a35df8aae6bced9cbb0e868bc985fbe8

  • SHA256

    820299f9d292eb2501ba81bad50e21ca3cb486746ed5a13133972ddfafd63fe3

  • SHA512

    6d4fbd9d1cdd3031381827e9e8eb41c4bacae2de7040e581121e141d87e6d67e26159edbcb7c683863fec517931d4f3f36e7cbfa2ab48a51e8636f0ff8cca490

  • SSDEEP

    24576:pRmJkcoQricOIQxiZY1iaT/NvDAFE0u/S9LACgkOC:mJZoQrbTFZY1iaTZEWF0ko

Malware Config

Targets

    • Target

      JaffaCakes118_c779bc7e8de74f93ce8b002a70c55664

    • Size

      1.0MB

    • MD5

      c779bc7e8de74f93ce8b002a70c55664

    • SHA1

      f6f23680a35df8aae6bced9cbb0e868bc985fbe8

    • SHA256

      820299f9d292eb2501ba81bad50e21ca3cb486746ed5a13133972ddfafd63fe3

    • SHA512

      6d4fbd9d1cdd3031381827e9e8eb41c4bacae2de7040e581121e141d87e6d67e26159edbcb7c683863fec517931d4f3f36e7cbfa2ab48a51e8636f0ff8cca490

    • SSDEEP

      24576:pRmJkcoQricOIQxiZY1iaT/NvDAFE0u/S9LACgkOC:mJZoQrbTFZY1iaTZEWF0ko

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Isrstealer family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks