General
-
Target
a0a2813cd5ba138f7758d98a37635694_JaffaCakes118
-
Size
4.9MB
-
Sample
240817-be78js1fml
-
MD5
a0a2813cd5ba138f7758d98a37635694
-
SHA1
6e1d29b7d8b17bbb8b90be866796114dee654de7
-
SHA256
2cc663da8e0285ff4c676d78eda9ead72f41d0447d5876fcba620e12c98aba17
-
SHA512
20fc7bb9757a9a9fa6118512d80857c7ec09326eacf70dc0ab124f6644ce1ebc77e70b81037562da2d00a85f17ab71b0e56d5f4d15ba290b9bb45ccad8896b19
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
Static task
static1
Behavioral task
behavioral1
Sample
a0a2813cd5ba138f7758d98a37635694_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a0a2813cd5ba138f7758d98a37635694_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
a0a2813cd5ba138f7758d98a37635694_JaffaCakes118
-
Size
4.9MB
-
MD5
a0a2813cd5ba138f7758d98a37635694
-
SHA1
6e1d29b7d8b17bbb8b90be866796114dee654de7
-
SHA256
2cc663da8e0285ff4c676d78eda9ead72f41d0447d5876fcba620e12c98aba17
-
SHA512
20fc7bb9757a9a9fa6118512d80857c7ec09326eacf70dc0ab124f6644ce1ebc77e70b81037562da2d00a85f17ab71b0e56d5f4d15ba290b9bb45ccad8896b19
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-