General
-
Target
54fb130e36f9335f843e242559cb2b0c_JaffaCakes118
-
Size
868KB
-
Sample
240518-qxndesea82
-
MD5
54fb130e36f9335f843e242559cb2b0c
-
SHA1
3f87bfafd292e7c22ebfc0b76ff7c7ec40c2a256
-
SHA256
d6637c6c05a5268fccd2602cd7d384f57448b570f38aab1f752dab4c1af00c59
-
SHA512
49485abcae8de4c7fc7c57f4359e0046e14565273ba73d96715e8c89371c7c9d3615d7ab0ab9983b0edcbf38706f5a6f4504aaf371fc9a48ea695a2a05761e27
-
SSDEEP
12288:NtQN+pguUxLeEpvF+z7E5QvNvlgTJmvsEs+ZSnR+is1igoe+esTCm:zQ4pI2lvllV0X+Z64j1ig42m
Static task
static1
Behavioral task
behavioral1
Sample
54fb130e36f9335f843e242559cb2b0c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
54fb130e36f9335f843e242559cb2b0c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
54fb130e36f9335f843e242559cb2b0c_JaffaCakes118
-
Size
868KB
-
MD5
54fb130e36f9335f843e242559cb2b0c
-
SHA1
3f87bfafd292e7c22ebfc0b76ff7c7ec40c2a256
-
SHA256
d6637c6c05a5268fccd2602cd7d384f57448b570f38aab1f752dab4c1af00c59
-
SHA512
49485abcae8de4c7fc7c57f4359e0046e14565273ba73d96715e8c89371c7c9d3615d7ab0ab9983b0edcbf38706f5a6f4504aaf371fc9a48ea695a2a05761e27
-
SSDEEP
12288:NtQN+pguUxLeEpvF+z7E5QvNvlgTJmvsEs+ZSnR+is1igoe+esTCm:zQ4pI2lvllV0X+Z64j1ig42m
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Drops startup file
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-