General
-
Target
d69aa173ddd88a016b9e177e62a8387c_JaffaCakes118
-
Size
352KB
-
Sample
240909-szce2svhnp
-
MD5
d69aa173ddd88a016b9e177e62a8387c
-
SHA1
91cf4469c80c51eecfd9b2b6db777c0628b7202d
-
SHA256
f9f7173f26836444033efaa9ad2fb04c443004d4c31308fc7c98f295dcd5be2e
-
SHA512
fdef8936ae38fd2ecb18d282d9c184bed3c53c96181e7fd7f2733719fae45652b1c263387f5e47a47dfaf31b4db30207488a1f88b49674fcb5692c790f67dae6
-
SSDEEP
6144:1tIleJcUVgS16Ws79FepxWULbxM+RX+FuxOvkhauFd5fJ:1tIleJcUVgSa6MU/xMcRxOvkhX5fJ
Static task
static1
Behavioral task
behavioral1
Sample
d69aa173ddd88a016b9e177e62a8387c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d69aa173ddd88a016b9e177e62a8387c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
d69aa173ddd88a016b9e177e62a8387c_JaffaCakes118
-
Size
352KB
-
MD5
d69aa173ddd88a016b9e177e62a8387c
-
SHA1
91cf4469c80c51eecfd9b2b6db777c0628b7202d
-
SHA256
f9f7173f26836444033efaa9ad2fb04c443004d4c31308fc7c98f295dcd5be2e
-
SHA512
fdef8936ae38fd2ecb18d282d9c184bed3c53c96181e7fd7f2733719fae45652b1c263387f5e47a47dfaf31b4db30207488a1f88b49674fcb5692c790f67dae6
-
SSDEEP
6144:1tIleJcUVgS16Ws79FepxWULbxM+RX+FuxOvkhauFd5fJ:1tIleJcUVgSa6MU/xMcRxOvkhX5fJ
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Suspicious use of SetThreadContext
-