General
-
Target
89e2225909a659294ab7c5fc631f05f8_JaffaCakes118
-
Size
232KB
-
Sample
240811-lnwk8atgqn
-
MD5
89e2225909a659294ab7c5fc631f05f8
-
SHA1
0e260455b8c8ada170f4963312ef1112a603a93c
-
SHA256
4cef8338763cdf036a181126edae3c8ea55655d7ad40cade2c0f6a48108f08fb
-
SHA512
a91fa638d604a3b87a74ab146b365ced7e6de57a013198b5e6e28b31bbeb7f34467f02d7684150e8a8118405ae6866750d03d2b7b63f1d3895695ec8587e4c4e
-
SSDEEP
6144:3RNzxkqq3Mc7R+AvyZKEuq934aLG/TI+++:Oh+Avyvuq9o3
Static task
static1
Behavioral task
behavioral1
Sample
89e2225909a659294ab7c5fc631f05f8_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
89e2225909a659294ab7c5fc631f05f8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
89e2225909a659294ab7c5fc631f05f8_JaffaCakes118
-
Size
232KB
-
MD5
89e2225909a659294ab7c5fc631f05f8
-
SHA1
0e260455b8c8ada170f4963312ef1112a603a93c
-
SHA256
4cef8338763cdf036a181126edae3c8ea55655d7ad40cade2c0f6a48108f08fb
-
SHA512
a91fa638d604a3b87a74ab146b365ced7e6de57a013198b5e6e28b31bbeb7f34467f02d7684150e8a8118405ae6866750d03d2b7b63f1d3895695ec8587e4c4e
-
SSDEEP
6144:3RNzxkqq3Mc7R+AvyZKEuq934aLG/TI+++:Oh+Avyvuq9o3
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-