General
-
Target
dd3352212bf53f2669e338ae7e6e39f7_JaffaCakes118
-
Size
508KB
-
Sample
240912-2yxh9szdrl
-
MD5
dd3352212bf53f2669e338ae7e6e39f7
-
SHA1
657ec2164d316cfcecafcfd6d04feb6318cc6542
-
SHA256
29d641c9584590971572e317560b6d8a55779c14733ecfd68565996e58c5ef3a
-
SHA512
a4414fa081ed28f98385faeb2dbc9ad8abe01865e9233f3017019314c2332f0f19b92215b6c218d61ecaa290ea7f4799771f92152469387d4bfc8925550112e1
-
SSDEEP
12288:t6CyJY9XMgAyb8kT2mU6K1l4c0944rRChta16C1kupc:9yQX7b8kATn4c09NJ1Hpc
Static task
static1
Behavioral task
behavioral1
Sample
dd3352212bf53f2669e338ae7e6e39f7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd3352212bf53f2669e338ae7e6e39f7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
dd3352212bf53f2669e338ae7e6e39f7_JaffaCakes118
-
Size
508KB
-
MD5
dd3352212bf53f2669e338ae7e6e39f7
-
SHA1
657ec2164d316cfcecafcfd6d04feb6318cc6542
-
SHA256
29d641c9584590971572e317560b6d8a55779c14733ecfd68565996e58c5ef3a
-
SHA512
a4414fa081ed28f98385faeb2dbc9ad8abe01865e9233f3017019314c2332f0f19b92215b6c218d61ecaa290ea7f4799771f92152469387d4bfc8925550112e1
-
SSDEEP
12288:t6CyJY9XMgAyb8kT2mU6K1l4c0944rRChta16C1kupc:9yQX7b8kATn4c09NJ1Hpc
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-