General
-
Target
86e0a65c4233d5a9d74bae394e68df0f_JaffaCakes118
-
Size
866KB
-
Sample
240531-nt78bagf55
-
MD5
86e0a65c4233d5a9d74bae394e68df0f
-
SHA1
cef07a38958a6a44e5a4421cde7a674a8c293c0d
-
SHA256
c35a8b3b3b954f61354068c0fc1fa3178c866dfe0eb7c04081b3b4f76991b197
-
SHA512
1834d2b9306e9ce84052d04ffcff5ef00caf46b3d0d1e78510ccef5d55c56eef7502b742084d7b9ce70678bc3c10d8c728a82b2c3714e01f13431353149e324b
-
SSDEEP
24576:hHe2nkxC790RisyxI63NHwI54nP2WUOdH2me:RgbcsyxIswI5Q2WUiH2m
Static task
static1
Behavioral task
behavioral1
Sample
86e0a65c4233d5a9d74bae394e68df0f_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
86e0a65c4233d5a9d74bae394e68df0f_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
86e0a65c4233d5a9d74bae394e68df0f_JaffaCakes118
-
Size
866KB
-
MD5
86e0a65c4233d5a9d74bae394e68df0f
-
SHA1
cef07a38958a6a44e5a4421cde7a674a8c293c0d
-
SHA256
c35a8b3b3b954f61354068c0fc1fa3178c866dfe0eb7c04081b3b4f76991b197
-
SHA512
1834d2b9306e9ce84052d04ffcff5ef00caf46b3d0d1e78510ccef5d55c56eef7502b742084d7b9ce70678bc3c10d8c728a82b2c3714e01f13431353149e324b
-
SSDEEP
24576:hHe2nkxC790RisyxI63NHwI54nP2WUOdH2me:RgbcsyxIswI5Q2WUiH2m
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Drops startup file
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-