General
-
Target
e24bfc0ca45f6c4ea4ba0e9ca10dcae4_JaffaCakes118
-
Size
6.0MB
-
Sample
240915-ms56wszckg
-
MD5
e24bfc0ca45f6c4ea4ba0e9ca10dcae4
-
SHA1
4cad40279cd1fcbfb0d21fa36de727eb6a1897a9
-
SHA256
719c8f939f7851f8d6e37cd6d6d68eb9f4b8b681c5812037f0dc159a0f7c8ae1
-
SHA512
3d0b55a5f2046a1e54a2a5637e30d510c03b704f78dfb653e7ecddec61e9d023b2e314766075126739a5238414e15a9c4484ef2a4a781584b6916faec53d530c
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
Static task
static1
Behavioral task
behavioral1
Sample
e24bfc0ca45f6c4ea4ba0e9ca10dcae4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e24bfc0ca45f6c4ea4ba0e9ca10dcae4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
e24bfc0ca45f6c4ea4ba0e9ca10dcae4_JaffaCakes118
-
Size
6.0MB
-
MD5
e24bfc0ca45f6c4ea4ba0e9ca10dcae4
-
SHA1
4cad40279cd1fcbfb0d21fa36de727eb6a1897a9
-
SHA256
719c8f939f7851f8d6e37cd6d6d68eb9f4b8b681c5812037f0dc159a0f7c8ae1
-
SHA512
3d0b55a5f2046a1e54a2a5637e30d510c03b704f78dfb653e7ecddec61e9d023b2e314766075126739a5238414e15a9c4484ef2a4a781584b6916faec53d530c
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-