General
-
Target
24a8aa62c2e2a5caffcd400552cb60e7_JaffaCakes118
-
Size
602KB
-
Sample
240704-fbejaaxarg
-
MD5
24a8aa62c2e2a5caffcd400552cb60e7
-
SHA1
5e000929b5493f98f01bd525831a3bf7a46b4cd8
-
SHA256
23ee565d880d89eff64c4193d0bf816871c60a2fc87858aaeadb417d21e3df7b
-
SHA512
bcdab6fc977578868371ee1370bf40b47760f080c2a361970256d3cb86a1a22470d3d4b1a07040e9fce4020ed33de04df0e561527a787a751a22c0db75c52a89
-
SSDEEP
6144:PZv/UtcH4d1yTTJDKjF0iiEt4TS3+D6YPHwQniojGLjwbrRbGydmL+6FGzyd278z:BkGH4dmTJ2J0iN3+DjTniKbbRqXrJ
Static task
static1
Behavioral task
behavioral1
Sample
24a8aa62c2e2a5caffcd400552cb60e7_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
24a8aa62c2e2a5caffcd400552cb60e7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
24a8aa62c2e2a5caffcd400552cb60e7_JaffaCakes118
-
Size
602KB
-
MD5
24a8aa62c2e2a5caffcd400552cb60e7
-
SHA1
5e000929b5493f98f01bd525831a3bf7a46b4cd8
-
SHA256
23ee565d880d89eff64c4193d0bf816871c60a2fc87858aaeadb417d21e3df7b
-
SHA512
bcdab6fc977578868371ee1370bf40b47760f080c2a361970256d3cb86a1a22470d3d4b1a07040e9fce4020ed33de04df0e561527a787a751a22c0db75c52a89
-
SSDEEP
6144:PZv/UtcH4d1yTTJDKjF0iiEt4TS3+D6YPHwQniojGLjwbrRbGydmL+6FGzyd278z:BkGH4dmTJ2J0iN3+DjTniKbbRqXrJ
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-