General

  • Target

    JaffaCakes118_c9a28e7a089a43ff800fd32a94e8edc2

  • Size

    223KB

  • Sample

    250209-bwrbcsslel

  • MD5

    c9a28e7a089a43ff800fd32a94e8edc2

  • SHA1

    77a610930174021c7000c06f14e4b1a7bcc275c8

  • SHA256

    a371c45b9e43f518eb3f66b1f1134064ca28c618a03aca63ab621888e12a1d08

  • SHA512

    89d94e4524cd1540e55822ebcbad2a4068f7562060885b4c8cb93b0610be9d61d2d90b3d9ed46dc76780d9cba1c97cb5ded2a7ca2ef77447a859783711fd26bd

  • SSDEEP

    3072:doy9wREmk+EIoHWKTHpklRdHek0FU4+gbcNhHpDsANcniSx7CAEOY43CGgqx8sB9:doyME+EIkHmwFU7RpDsAeIn1G44Q8Rl

Malware Config

Targets

    • Target

      JaffaCakes118_c9a28e7a089a43ff800fd32a94e8edc2

    • Size

      223KB

    • MD5

      c9a28e7a089a43ff800fd32a94e8edc2

    • SHA1

      77a610930174021c7000c06f14e4b1a7bcc275c8

    • SHA256

      a371c45b9e43f518eb3f66b1f1134064ca28c618a03aca63ab621888e12a1d08

    • SHA512

      89d94e4524cd1540e55822ebcbad2a4068f7562060885b4c8cb93b0610be9d61d2d90b3d9ed46dc76780d9cba1c97cb5ded2a7ca2ef77447a859783711fd26bd

    • SSDEEP

      3072:doy9wREmk+EIoHWKTHpklRdHek0FU4+gbcNhHpDsANcniSx7CAEOY43CGgqx8sB9:doyME+EIkHmwFU7RpDsAeIn1G44Q8Rl

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Isrstealer family

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks