General
-
Target
70097197116270790a3824cec0567321_JaffaCakes118
-
Size
4.8MB
-
Sample
240725-r65vhaxepe
-
MD5
70097197116270790a3824cec0567321
-
SHA1
d392dd04be60100240634e41ded5bc8f04378b27
-
SHA256
631d05a691f810293ff0fc64df7d727a0c2fbd26abf93bad0b2daf8458595e4a
-
SHA512
965693b1a33008c8c334e0b841fdeea10df80de2e088ca68685078662ce2e7a621038ac463055cf02db5d9fc65d22da88b2b4c56ef64dd2917c8922ce07be2c1
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
Static task
static1
Behavioral task
behavioral1
Sample
70097197116270790a3824cec0567321_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
70097197116270790a3824cec0567321_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
70097197116270790a3824cec0567321_JaffaCakes118
-
Size
4.8MB
-
MD5
70097197116270790a3824cec0567321
-
SHA1
d392dd04be60100240634e41ded5bc8f04378b27
-
SHA256
631d05a691f810293ff0fc64df7d727a0c2fbd26abf93bad0b2daf8458595e4a
-
SHA512
965693b1a33008c8c334e0b841fdeea10df80de2e088ca68685078662ce2e7a621038ac463055cf02db5d9fc65d22da88b2b4c56ef64dd2917c8922ce07be2c1
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-