General
-
Target
c6906c96dff316f1a2525980ccad5fdd_JaffaCakes118
-
Size
595KB
-
Sample
240828-k6dmpasfjg
-
MD5
c6906c96dff316f1a2525980ccad5fdd
-
SHA1
9becb7009df39331a7c693c871d6e2c5bd28e805
-
SHA256
ccf736f7cd9a9e92db675dbb7dc1ba47ec8332c078eea343e0877184f87d7fcd
-
SHA512
fcebbbdd08260c8d6b47f9e614157c190bfbb8de36b59614e79708e5f5e0b9e7c75f9fecb489a2fe4b93edbb733ec4bcaa1caa738265263aa0a91ede601faf7f
-
SSDEEP
6144:n2VZSbjwUhFZxfEtncaHvcl1gTfy7X2dIffr0uo3Jp5w2Cc+oifzUmkRPYaC:nkGbzrW0/GOfIuK5w2zhh1RPY
Static task
static1
Behavioral task
behavioral1
Sample
c6906c96dff316f1a2525980ccad5fdd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c6906c96dff316f1a2525980ccad5fdd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
c6906c96dff316f1a2525980ccad5fdd_JaffaCakes118
-
Size
595KB
-
MD5
c6906c96dff316f1a2525980ccad5fdd
-
SHA1
9becb7009df39331a7c693c871d6e2c5bd28e805
-
SHA256
ccf736f7cd9a9e92db675dbb7dc1ba47ec8332c078eea343e0877184f87d7fcd
-
SHA512
fcebbbdd08260c8d6b47f9e614157c190bfbb8de36b59614e79708e5f5e0b9e7c75f9fecb489a2fe4b93edbb733ec4bcaa1caa738265263aa0a91ede601faf7f
-
SSDEEP
6144:n2VZSbjwUhFZxfEtncaHvcl1gTfy7X2dIffr0uo3Jp5w2Cc+oifzUmkRPYaC:nkGbzrW0/GOfIuK5w2zhh1RPY
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-