General
-
Target
b97e11c9a73b49523c5665232354449e_JaffaCakes118
-
Size
713KB
-
Sample
240822-3hlbqstcqc
-
MD5
b97e11c9a73b49523c5665232354449e
-
SHA1
e5570e2f8b5914d71a9ec54b6e3458f8eadba919
-
SHA256
b6077289fa1c83c97422fbc93892b5a05bea9fab7cb4d6f64c8ed12add22bbb2
-
SHA512
2b935e5f1d32db1a38d7479f1f8fe7ef89896e0f9041b637a0be6ecb288b9bfe8b95b5e655d8ae38e60f81d26c40369eafa349e7ef9be4ea51e5bb82d2343cac
-
SSDEEP
12288:9jjW2SC23NqEXtKz5s1LQk1n6qJb+0UT8lCjw4GKymr53noqSOKFYPAz:9eCwNTXAa1kCn6ab+0UTtwJKyW5g2Y
Static task
static1
Behavioral task
behavioral1
Sample
b97e11c9a73b49523c5665232354449e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b97e11c9a73b49523c5665232354449e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
b97e11c9a73b49523c5665232354449e_JaffaCakes118
-
Size
713KB
-
MD5
b97e11c9a73b49523c5665232354449e
-
SHA1
e5570e2f8b5914d71a9ec54b6e3458f8eadba919
-
SHA256
b6077289fa1c83c97422fbc93892b5a05bea9fab7cb4d6f64c8ed12add22bbb2
-
SHA512
2b935e5f1d32db1a38d7479f1f8fe7ef89896e0f9041b637a0be6ecb288b9bfe8b95b5e655d8ae38e60f81d26c40369eafa349e7ef9be4ea51e5bb82d2343cac
-
SSDEEP
12288:9jjW2SC23NqEXtKz5s1LQk1n6qJb+0UT8lCjw4GKymr53noqSOKFYPAz:9eCwNTXAa1kCn6ab+0UTtwJKyW5g2Y
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-