General
-
Target
bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118
-
Size
248KB
-
Sample
240823-vfqjnswfke
-
MD5
bc900ec165c7974d6b8a35003e8b469f
-
SHA1
2455fca46873fddc8e776278d931e4f86bea326d
-
SHA256
93f2e07cc7722a22a158b71a0cc2a456f4fbdca5cfd67fa8e905e066522216f3
-
SHA512
d8ecb449ce2e6489f345a29fdf9a8ab2d16fa5407310195f8e8dbf6590c0160417a054cc6e908badb0ade9c50cde33a503ffeb06121d12a83011b7fd0444d060
-
SSDEEP
3072:hm+JmSCT1QEMQkrp8RCODSS2olEPKeMFxdK0NHhwCxzL5PKATEt1l8Hw3bImQQEj:8+6T6EMjpQDL20EP1MvwCIOH
Static task
static1
Behavioral task
behavioral1
Sample
bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118
-
Size
248KB
-
MD5
bc900ec165c7974d6b8a35003e8b469f
-
SHA1
2455fca46873fddc8e776278d931e4f86bea326d
-
SHA256
93f2e07cc7722a22a158b71a0cc2a456f4fbdca5cfd67fa8e905e066522216f3
-
SHA512
d8ecb449ce2e6489f345a29fdf9a8ab2d16fa5407310195f8e8dbf6590c0160417a054cc6e908badb0ade9c50cde33a503ffeb06121d12a83011b7fd0444d060
-
SSDEEP
3072:hm+JmSCT1QEMQkrp8RCODSS2olEPKeMFxdK0NHhwCxzL5PKATEt1l8Hw3bImQQEj:8+6T6EMjpQDL20EP1MvwCIOH
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-