General
-
Target
be1a20e64ff1c176035c672a05341b75_JaffaCakes118
-
Size
4.2MB
-
Sample
240824-hrk24szfrq
-
MD5
be1a20e64ff1c176035c672a05341b75
-
SHA1
454eaf52058b2d9dc2d085c26678cf97c352c292
-
SHA256
300ffcf7f7b1d9ee344348d1eaff48dec390ac28cf080ab39b79b881c03b6ee2
-
SHA512
fc73593280ab0365c693886db42d1f5c8811b2a721933be5a4944ee41dd4f58046ace976743a38a981ec88be1d87b6a98cc06f95ad29f3e75b19b07a1a4b1a6e
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
Static task
static1
Behavioral task
behavioral1
Sample
be1a20e64ff1c176035c672a05341b75_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be1a20e64ff1c176035c672a05341b75_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
be1a20e64ff1c176035c672a05341b75_JaffaCakes118
-
Size
4.2MB
-
MD5
be1a20e64ff1c176035c672a05341b75
-
SHA1
454eaf52058b2d9dc2d085c26678cf97c352c292
-
SHA256
300ffcf7f7b1d9ee344348d1eaff48dec390ac28cf080ab39b79b881c03b6ee2
-
SHA512
fc73593280ab0365c693886db42d1f5c8811b2a721933be5a4944ee41dd4f58046ace976743a38a981ec88be1d87b6a98cc06f95ad29f3e75b19b07a1a4b1a6e
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-