General
-
Target
066d70aad37e93ff30dfea3cd49ccc79_JaffaCakes118
-
Size
439KB
-
Sample
240429-aygn9sda87
-
MD5
066d70aad37e93ff30dfea3cd49ccc79
-
SHA1
0de81c392d9eaa47c2a42e2ea8e0cc33519448b8
-
SHA256
0a4091e082cd283c9b24277cdcf0bff2adbadde1371b81321620cd4f85dde7e5
-
SHA512
8d53f0c36c0207ac1cfffee70d6070a24d47bf5e7f5c93d1d21eb6a2f931b08c6680ecb78c4e3c47d5e35737d35363837942c9f42321693059dce84a0008e587
-
SSDEEP
6144:csoxUUS9H0b5sDO1GdtzvZquk15Qu93RJW9MchgGDG6g9C+DqdhTEKFXe:E+UevdtzwbCU6McZK6g9DqD/FXe
Static task
static1
Behavioral task
behavioral1
Sample
066d70aad37e93ff30dfea3cd49ccc79_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
066d70aad37e93ff30dfea3cd49ccc79_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
066d70aad37e93ff30dfea3cd49ccc79_JaffaCakes118
-
Size
439KB
-
MD5
066d70aad37e93ff30dfea3cd49ccc79
-
SHA1
0de81c392d9eaa47c2a42e2ea8e0cc33519448b8
-
SHA256
0a4091e082cd283c9b24277cdcf0bff2adbadde1371b81321620cd4f85dde7e5
-
SHA512
8d53f0c36c0207ac1cfffee70d6070a24d47bf5e7f5c93d1d21eb6a2f931b08c6680ecb78c4e3c47d5e35737d35363837942c9f42321693059dce84a0008e587
-
SSDEEP
6144:csoxUUS9H0b5sDO1GdtzvZquk15Qu93RJW9MchgGDG6g9C+DqdhTEKFXe:E+UevdtzwbCU6McZK6g9DqD/FXe
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-