General
-
Target
8c5f105eb24d29e66e1b89a734f0aada_JaffaCakes118
-
Size
240KB
-
Sample
240811-288paatekn
-
MD5
8c5f105eb24d29e66e1b89a734f0aada
-
SHA1
2d3fbdd86bd1e441f7050436e5eac56dade36541
-
SHA256
563dd975f0211df190d9c1ac1538c16ea3a82aba413f199b5b7000c08570a1e2
-
SHA512
b836ee8b2637d5122735618935caefa0d8359590357aa1ad90469f14028e9d1ce1edfa569aeb76bcf55895f253a7735f8891e9076570f79a45ae0bd4383e092b
-
SSDEEP
6144:wLa94GN7fiIEAeLHJx0ZW6x6FJzw4E5i3ZUp/yq0DASrikrhwKACS:wW94GN7fiIEAeLHJx0ZWJjjNJcyq8rzs
Static task
static1
Behavioral task
behavioral1
Sample
8c5f105eb24d29e66e1b89a734f0aada_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c5f105eb24d29e66e1b89a734f0aada_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
8c5f105eb24d29e66e1b89a734f0aada_JaffaCakes118
-
Size
240KB
-
MD5
8c5f105eb24d29e66e1b89a734f0aada
-
SHA1
2d3fbdd86bd1e441f7050436e5eac56dade36541
-
SHA256
563dd975f0211df190d9c1ac1538c16ea3a82aba413f199b5b7000c08570a1e2
-
SHA512
b836ee8b2637d5122735618935caefa0d8359590357aa1ad90469f14028e9d1ce1edfa569aeb76bcf55895f253a7735f8891e9076570f79a45ae0bd4383e092b
-
SSDEEP
6144:wLa94GN7fiIEAeLHJx0ZW6x6FJzw4E5i3ZUp/yq0DASrikrhwKACS:wW94GN7fiIEAeLHJx0ZWJjjNJcyq8rzs
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-