General
-
Target
8b43a72a90aa534dade4706e8b77f271_JaffaCakes118
-
Size
1.2MB
-
Sample
240811-vwbqfsygnn
-
MD5
8b43a72a90aa534dade4706e8b77f271
-
SHA1
5d08fa7ba457392acbf6f83ca44bc3f7e68961dc
-
SHA256
a686af167b443bfc8e9bfd3332f349c0d85bb7f2daf83d081f549abc737e8fd5
-
SHA512
744da373c99fedb0b5767bda3ee2682bc98bdc9ffc3d7e57d69b00a9af0ac2b76cec5e4a6636b2348068faf01c1062abbb40ab4b341155bfc10b1af99702bc56
-
SSDEEP
24576:3R3wdDxvbHRDYJ10U8lwtqr9RW4qA7YM5F5rW2g6tGEf7ZzL8g:BGbH2J10U8lwtUj1nhJgWf9zYg
Static task
static1
Behavioral task
behavioral1
Sample
8b43a72a90aa534dade4706e8b77f271_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8b43a72a90aa534dade4706e8b77f271_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
8b43a72a90aa534dade4706e8b77f271_JaffaCakes118
-
Size
1.2MB
-
MD5
8b43a72a90aa534dade4706e8b77f271
-
SHA1
5d08fa7ba457392acbf6f83ca44bc3f7e68961dc
-
SHA256
a686af167b443bfc8e9bfd3332f349c0d85bb7f2daf83d081f549abc737e8fd5
-
SHA512
744da373c99fedb0b5767bda3ee2682bc98bdc9ffc3d7e57d69b00a9af0ac2b76cec5e4a6636b2348068faf01c1062abbb40ab4b341155bfc10b1af99702bc56
-
SSDEEP
24576:3R3wdDxvbHRDYJ10U8lwtqr9RW4qA7YM5F5rW2g6tGEf7ZzL8g:BGbH2J10U8lwtUj1nhJgWf9zYg
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-