General
-
Target
2ca2c3d114572d4c688defac3d9d742c_JaffaCakes118
-
Size
604KB
-
Sample
240708-rd3jnssejk
-
MD5
2ca2c3d114572d4c688defac3d9d742c
-
SHA1
b2f457b463b3e5b20bfac3ae39a14002075116e7
-
SHA256
5bca96912ca868f0136550cb0d7976bfb48dc45065fb8c403e9f2d4e97fd349b
-
SHA512
41adce55141b55f95e58a54a24dc62b927de7c6274f4a12345796cbc542ad6dfd284480c7683f780a425149529c1b9cb91365d209bd7326113d788e8c738d45b
-
SSDEEP
12288:i0tCVTnJba1xuyzGgG1TQ9GuXGYRzBXRekpMFT:i0tCNJbae0EFjYRzBXU4MF
Static task
static1
Behavioral task
behavioral1
Sample
2ca2c3d114572d4c688defac3d9d742c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2ca2c3d114572d4c688defac3d9d742c_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Malware Config
Targets
-
-
Target
2ca2c3d114572d4c688defac3d9d742c_JaffaCakes118
-
Size
604KB
-
MD5
2ca2c3d114572d4c688defac3d9d742c
-
SHA1
b2f457b463b3e5b20bfac3ae39a14002075116e7
-
SHA256
5bca96912ca868f0136550cb0d7976bfb48dc45065fb8c403e9f2d4e97fd349b
-
SHA512
41adce55141b55f95e58a54a24dc62b927de7c6274f4a12345796cbc542ad6dfd284480c7683f780a425149529c1b9cb91365d209bd7326113d788e8c738d45b
-
SSDEEP
12288:i0tCVTnJba1xuyzGgG1TQ9GuXGYRzBXRekpMFT:i0tCNJbae0EFjYRzBXU4MF
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-