General
-
Target
e05a1a93cd29737f4bd117d0e786e1bc_JaffaCakes118
-
Size
265KB
-
Sample
240914-rjsawsxgkj
-
MD5
e05a1a93cd29737f4bd117d0e786e1bc
-
SHA1
ab932c26fbbc1b4afa769ca6df09a0cdd55926eb
-
SHA256
8f95a2a9ae1e0c859cec109b73a7384d117acfcd4da36762a47e6658ddf1ab49
-
SHA512
6ba947b1393a83c4f6d6c0b72d3b19964b2d2869712ea0193b9f1b191cd0bad0c24e56403b430b3807571730faa4e7dc83200cda4b602704d3d71288e2a6ac28
-
SSDEEP
6144:rSncRl+TqPRRdIKCC0ef//uXltKc+LVsz9b8:u4LdFeCXuLKcCVsz6
Behavioral task
behavioral1
Sample
e05a1a93cd29737f4bd117d0e786e1bc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e05a1a93cd29737f4bd117d0e786e1bc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
e05a1a93cd29737f4bd117d0e786e1bc_JaffaCakes118
-
Size
265KB
-
MD5
e05a1a93cd29737f4bd117d0e786e1bc
-
SHA1
ab932c26fbbc1b4afa769ca6df09a0cdd55926eb
-
SHA256
8f95a2a9ae1e0c859cec109b73a7384d117acfcd4da36762a47e6658ddf1ab49
-
SHA512
6ba947b1393a83c4f6d6c0b72d3b19964b2d2869712ea0193b9f1b191cd0bad0c24e56403b430b3807571730faa4e7dc83200cda4b602704d3d71288e2a6ac28
-
SSDEEP
6144:rSncRl+TqPRRdIKCC0ef//uXltKc+LVsz9b8:u4LdFeCXuLKcCVsz6
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-