General
-
Target
cb51b706cbcb7d64cf679468e099b9af_JaffaCakes118
-
Size
120KB
-
Sample
240830-v5a6aaxblq
-
MD5
cb51b706cbcb7d64cf679468e099b9af
-
SHA1
98fbe71667b137bdb191fc5b5bf51487297283f6
-
SHA256
a667935edc15dba0349d3035a428dbc6f13a3282cbf079757635e57698726db3
-
SHA512
b3be9d357a91e3c3902c86402399cfe0c824a0ddb6dcb286e48e226cbccbbb666ed84e8cd446d66b24fc033d670807544bd7ad7ca774772739ef08421d8a3310
-
SSDEEP
3072:6La94GN7fiIEAeLHJx0PUZFvoJn7c4/bY+lAhKiTCQlJL:6La94GN7fiIEAeLHJx0cTQJn7cnKiOQP
Static task
static1
Behavioral task
behavioral1
Sample
cb51b706cbcb7d64cf679468e099b9af_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cb51b706cbcb7d64cf679468e099b9af_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
cb51b706cbcb7d64cf679468e099b9af_JaffaCakes118
-
Size
120KB
-
MD5
cb51b706cbcb7d64cf679468e099b9af
-
SHA1
98fbe71667b137bdb191fc5b5bf51487297283f6
-
SHA256
a667935edc15dba0349d3035a428dbc6f13a3282cbf079757635e57698726db3
-
SHA512
b3be9d357a91e3c3902c86402399cfe0c824a0ddb6dcb286e48e226cbccbbb666ed84e8cd446d66b24fc033d670807544bd7ad7ca774772739ef08421d8a3310
-
SSDEEP
3072:6La94GN7fiIEAeLHJx0PUZFvoJn7c4/bY+lAhKiTCQlJL:6La94GN7fiIEAeLHJx0cTQJn7cnKiOQP
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-