General
-
Target
a50e46671310b11f10127a511a7851cb_JaffaCakes118
-
Size
376KB
-
Sample
240818-c2vrea1alh
-
MD5
a50e46671310b11f10127a511a7851cb
-
SHA1
c1c44ac58d92a0654d27a9c9f4ff87992f8f8bce
-
SHA256
7e13c6933f03854380745c5e9ce130e16d95e18d1575e9616c76ae2174f03e02
-
SHA512
44c8a918ca0fe67d09330ca641f251ab4c44528a46fa316560c1b1a9353bcde2ec466f94a53462e1e48ca57f55ab535b250c7eae5aa8c41fa2a030097561355b
-
SSDEEP
6144:iWGTfT4xEEmmETtSXBbKYwaq5TwjJCi/vv98gMUVbviIKzKxwV:hmmETYXBbRwaqBEP9uYmImKxo
Static task
static1
Behavioral task
behavioral1
Sample
a50e46671310b11f10127a511a7851cb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a50e46671310b11f10127a511a7851cb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
a50e46671310b11f10127a511a7851cb_JaffaCakes118
-
Size
376KB
-
MD5
a50e46671310b11f10127a511a7851cb
-
SHA1
c1c44ac58d92a0654d27a9c9f4ff87992f8f8bce
-
SHA256
7e13c6933f03854380745c5e9ce130e16d95e18d1575e9616c76ae2174f03e02
-
SHA512
44c8a918ca0fe67d09330ca641f251ab4c44528a46fa316560c1b1a9353bcde2ec466f94a53462e1e48ca57f55ab535b250c7eae5aa8c41fa2a030097561355b
-
SSDEEP
6144:iWGTfT4xEEmmETtSXBbKYwaq5TwjJCi/vv98gMUVbviIKzKxwV:hmmETYXBbRwaqBEP9uYmImKxo
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-