General
-
Target
8809858de680c7a36e1bc0972c1847ef_JaffaCakes118
-
Size
1.1MB
-
Sample
240810-23v61axbrh
-
MD5
8809858de680c7a36e1bc0972c1847ef
-
SHA1
943cb9e9365bf92fa0ad9c06bc63caaa77815b05
-
SHA256
d8ece9627b3f6ee7906b6dea24a52ecf0c6dbac3f5da250f653b9a418e464ef1
-
SHA512
edaa89705d61ce71cbf114b8a92c46158d1ff0e31bd3ecb596b3ea3e2520bffcec4c8082d37fa765452486dc6988755c4724ffdba88ab4433443ae8c3cd3d2a7
-
SSDEEP
24576:icZKZGKzir+ldqvxmlvSFaGV4JmnLS229XPlIUrQIGPk8Puyp:i2KIgir+nqnMMCpXP5r5Gw4
Static task
static1
Behavioral task
behavioral1
Sample
8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
8809858de680c7a36e1bc0972c1847ef_JaffaCakes118
-
Size
1.1MB
-
MD5
8809858de680c7a36e1bc0972c1847ef
-
SHA1
943cb9e9365bf92fa0ad9c06bc63caaa77815b05
-
SHA256
d8ece9627b3f6ee7906b6dea24a52ecf0c6dbac3f5da250f653b9a418e464ef1
-
SHA512
edaa89705d61ce71cbf114b8a92c46158d1ff0e31bd3ecb596b3ea3e2520bffcec4c8082d37fa765452486dc6988755c4724ffdba88ab4433443ae8c3cd3d2a7
-
SSDEEP
24576:icZKZGKzir+ldqvxmlvSFaGV4JmnLS229XPlIUrQIGPk8Puyp:i2KIgir+nqnMMCpXP5r5Gw4
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-