General
-
Target
d38f179b057a7dd91cdca34db51a0c08_JaffaCakes118
-
Size
372KB
-
Sample
240908-fae4esxbqk
-
MD5
d38f179b057a7dd91cdca34db51a0c08
-
SHA1
ace630d040759e360c8145a2214b0152630b4b33
-
SHA256
9c2c62d4c59900ffbaa1d74d0f9694efcb20e82321646568c2fd7b2345fb3b3c
-
SHA512
a7bead564fd4b945b02560c7b60b67b1c88f99231d0706de9db04693a0ecd2ed9d8b95c06cf246c1cbf8c1c8011226b9a9421790bf5b5a7086c55294029dadf0
-
SSDEEP
6144:NR7/LHNoeTp1gm0rYMLOTvEBSq0w7xZ6s6igcnz/RfyhZ4TtbuIwx+BZGb0g5j:NVzdTp1gj0MLOT0SqRxo1igcz/UcTJuP
Static task
static1
Behavioral task
behavioral1
Sample
d38f179b057a7dd91cdca34db51a0c08_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d38f179b057a7dd91cdca34db51a0c08_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
d38f179b057a7dd91cdca34db51a0c08_JaffaCakes118
-
Size
372KB
-
MD5
d38f179b057a7dd91cdca34db51a0c08
-
SHA1
ace630d040759e360c8145a2214b0152630b4b33
-
SHA256
9c2c62d4c59900ffbaa1d74d0f9694efcb20e82321646568c2fd7b2345fb3b3c
-
SHA512
a7bead564fd4b945b02560c7b60b67b1c88f99231d0706de9db04693a0ecd2ed9d8b95c06cf246c1cbf8c1c8011226b9a9421790bf5b5a7086c55294029dadf0
-
SSDEEP
6144:NR7/LHNoeTp1gm0rYMLOTvEBSq0w7xZ6s6igcnz/RfyhZ4TtbuIwx+BZGb0g5j:NVzdTp1gj0MLOT0SqRxo1igcz/UcTJuP
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Suspicious use of SetThreadContext
-