General
-
Target
cdb48abdb2c5e70a3f5fc48c0db0275e_JaffaCakes118
-
Size
5.0MB
-
Sample
240831-2ahefayejn
-
MD5
cdb48abdb2c5e70a3f5fc48c0db0275e
-
SHA1
6a0bf23984f9e6f134ba4b1abf9e102ef2c48532
-
SHA256
4af5ee46602b3eef593e9562384ccd56e029a3a374f78b37deb069bb435f39f5
-
SHA512
93d22dc893c01591552fe000f7cb648c98de36ded911c5bd1d8da4e77b48474a26db4be4a825be75fdb2833c4320c9cca764cb12d5bfa342c1a6fdfaacd13c7c
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
Static task
static1
Behavioral task
behavioral1
Sample
cdb48abdb2c5e70a3f5fc48c0db0275e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cdb48abdb2c5e70a3f5fc48c0db0275e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
cdb48abdb2c5e70a3f5fc48c0db0275e_JaffaCakes118
-
Size
5.0MB
-
MD5
cdb48abdb2c5e70a3f5fc48c0db0275e
-
SHA1
6a0bf23984f9e6f134ba4b1abf9e102ef2c48532
-
SHA256
4af5ee46602b3eef593e9562384ccd56e029a3a374f78b37deb069bb435f39f5
-
SHA512
93d22dc893c01591552fe000f7cb648c98de36ded911c5bd1d8da4e77b48474a26db4be4a825be75fdb2833c4320c9cca764cb12d5bfa342c1a6fdfaacd13c7c
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-