General
-
Target
563ccd2ff2ab1fe69c12e4606dcf1b6a_JaffaCakes118
-
Size
422KB
-
Sample
240718-fpclvazblc
-
MD5
563ccd2ff2ab1fe69c12e4606dcf1b6a
-
SHA1
d15eba60941acd02fc457336f1f23f87bb4494ff
-
SHA256
6930565571319c8692dca27ee5b1747d6fb891dd14ec8c01a1c5cc068aaa6220
-
SHA512
0107a5e132ce10d96228dfbade60726000141e51debc016292fae298ce5ebdfbc44890c5b21cd9c601fee71a895caca4f14ef4698f39e869d48851e961186e2d
-
SSDEEP
12288:gxHGypkpBqjrXKSybKdnDuUfctvDNOv+129H:gxdplhnqUSDt129
Static task
static1
Behavioral task
behavioral1
Sample
563ccd2ff2ab1fe69c12e4606dcf1b6a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
563ccd2ff2ab1fe69c12e4606dcf1b6a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
563ccd2ff2ab1fe69c12e4606dcf1b6a_JaffaCakes118
-
Size
422KB
-
MD5
563ccd2ff2ab1fe69c12e4606dcf1b6a
-
SHA1
d15eba60941acd02fc457336f1f23f87bb4494ff
-
SHA256
6930565571319c8692dca27ee5b1747d6fb891dd14ec8c01a1c5cc068aaa6220
-
SHA512
0107a5e132ce10d96228dfbade60726000141e51debc016292fae298ce5ebdfbc44890c5b21cd9c601fee71a895caca4f14ef4698f39e869d48851e961186e2d
-
SSDEEP
12288:gxHGypkpBqjrXKSybKdnDuUfctvDNOv+129H:gxdplhnqUSDt129
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-