General
-
Target
7d306b63492e111434a68d343259f1b5_JaffaCakes118
-
Size
536KB
-
Sample
240731-vavlfaybng
-
MD5
7d306b63492e111434a68d343259f1b5
-
SHA1
ae0bb21e16036f5ba2023ec623d8163aad9a9077
-
SHA256
99cd0b4791ba31a7462d5c17b1e9a28c8be58063ce29cb975f217001041f1760
-
SHA512
b575736a097b378e540aea8249eee17e9fbec3a4f8e9a4c0ae6c98694fe3a7f9850d3118c2a636c5af12fa965474f4f44afd442e2b524ed16e2116b303664bee
-
SSDEEP
12288:U022tBnaBu7XYOGdVvdI6xQ4qvUVDBFkf+dmEdx4WeDMYc/J:UkBnaBu7IOGrvdIR4q4zkf+dT4W5rB
Static task
static1
Behavioral task
behavioral1
Sample
7d306b63492e111434a68d343259f1b5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7d306b63492e111434a68d343259f1b5_JaffaCakes118.exe
Resource
win10v2004-20240730-en
Malware Config
Targets
-
-
Target
7d306b63492e111434a68d343259f1b5_JaffaCakes118
-
Size
536KB
-
MD5
7d306b63492e111434a68d343259f1b5
-
SHA1
ae0bb21e16036f5ba2023ec623d8163aad9a9077
-
SHA256
99cd0b4791ba31a7462d5c17b1e9a28c8be58063ce29cb975f217001041f1760
-
SHA512
b575736a097b378e540aea8249eee17e9fbec3a4f8e9a4c0ae6c98694fe3a7f9850d3118c2a636c5af12fa965474f4f44afd442e2b524ed16e2116b303664bee
-
SSDEEP
12288:U022tBnaBu7XYOGdVvdI6xQ4qvUVDBFkf+dmEdx4WeDMYc/J:UkBnaBu7IOGrvdIR4q4zkf+dT4W5rB
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-