General
-
Target
b24b97b44f7e1b8a5299ab4d616052d6_JaffaCakes118
-
Size
4.4MB
-
Sample
240821-gd1pzawcqj
-
MD5
b24b97b44f7e1b8a5299ab4d616052d6
-
SHA1
bf51fe44e27751b4b499ed2fcc2db2fd320ad678
-
SHA256
77fa41018a41ea51bf2b093a35c2ea4caf6ca6b8cb9ed94ad04ed5c64cd680ef
-
SHA512
78c84024039c10bae520f60d29d9fd6057486cf1e5c119585731138169614ce90ab9aa9106746036254cf93f020fa6c7098335fc7b5f8496db014f8369d09a05
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
Static task
static1
Behavioral task
behavioral1
Sample
b24b97b44f7e1b8a5299ab4d616052d6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b24b97b44f7e1b8a5299ab4d616052d6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
b24b97b44f7e1b8a5299ab4d616052d6_JaffaCakes118
-
Size
4.4MB
-
MD5
b24b97b44f7e1b8a5299ab4d616052d6
-
SHA1
bf51fe44e27751b4b499ed2fcc2db2fd320ad678
-
SHA256
77fa41018a41ea51bf2b093a35c2ea4caf6ca6b8cb9ed94ad04ed5c64cd680ef
-
SHA512
78c84024039c10bae520f60d29d9fd6057486cf1e5c119585731138169614ce90ab9aa9106746036254cf93f020fa6c7098335fc7b5f8496db014f8369d09a05
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-