General
-
Target
cf378ff9c338f8e3fe2ccbc279ccb2d8_JaffaCakes118
-
Size
276KB
-
Sample
240906-ldf3sayfkf
-
MD5
cf378ff9c338f8e3fe2ccbc279ccb2d8
-
SHA1
aa49bb7ae6537617c001e72b1bb3add56fb25340
-
SHA256
ba59dfee0118b34605cc03bb0b53033adf9f84d97f3dd91c41a857708237dfd9
-
SHA512
bbed1e295569b7b7d06ea64a710a9f860fa4d4a137d0face966a86dccce65e88258f21463d17aada2e118f36d42b5c3f4da2ce1eaf50a8f2f9d082d73aaeeeae
-
SSDEEP
6144:h+fyWABddKtrqpOsJ2as+/IkgW86+qy9EWL1nhAGEr3nX1l:h+fqdstrqQsJb/ccy9EWhhQ1
Static task
static1
Behavioral task
behavioral1
Sample
cf378ff9c338f8e3fe2ccbc279ccb2d8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf378ff9c338f8e3fe2ccbc279ccb2d8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
cf378ff9c338f8e3fe2ccbc279ccb2d8_JaffaCakes118
-
Size
276KB
-
MD5
cf378ff9c338f8e3fe2ccbc279ccb2d8
-
SHA1
aa49bb7ae6537617c001e72b1bb3add56fb25340
-
SHA256
ba59dfee0118b34605cc03bb0b53033adf9f84d97f3dd91c41a857708237dfd9
-
SHA512
bbed1e295569b7b7d06ea64a710a9f860fa4d4a137d0face966a86dccce65e88258f21463d17aada2e118f36d42b5c3f4da2ce1eaf50a8f2f9d082d73aaeeeae
-
SSDEEP
6144:h+fyWABddKtrqpOsJ2as+/IkgW86+qy9EWL1nhAGEr3nX1l:h+fqdstrqQsJb/ccy9EWhhQ1
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1