General
-
Target
e4ee7aca896a25d25a15e027c1f57b49_JaffaCakes118
-
Size
480KB
-
Sample
240916-rdta1a1fjf
-
MD5
e4ee7aca896a25d25a15e027c1f57b49
-
SHA1
fd92668749575773ab56e435a96a8029431e2897
-
SHA256
22e2af8ed2016a8eea1bd1e331e06a58f251ce6a470c657157e1c4c3f33bdb99
-
SHA512
b3fc31b21bf0b9938cc1b76840b1741ca0c21f9fd0340e39fd1866b28002b6be33d66705040d0cc1cde1622858fd13f63581a106c629998103cda0c61802ef82
-
SSDEEP
12288:jx9bxAtPcU6YEo48WgxFOMKefOrVJ6Hw8z/lwiUov:jx9b2tcnYEo3zybefcJR8z/lwiUo
Static task
static1
Behavioral task
behavioral1
Sample
e4ee7aca896a25d25a15e027c1f57b49_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4ee7aca896a25d25a15e027c1f57b49_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
e4ee7aca896a25d25a15e027c1f57b49_JaffaCakes118
-
Size
480KB
-
MD5
e4ee7aca896a25d25a15e027c1f57b49
-
SHA1
fd92668749575773ab56e435a96a8029431e2897
-
SHA256
22e2af8ed2016a8eea1bd1e331e06a58f251ce6a470c657157e1c4c3f33bdb99
-
SHA512
b3fc31b21bf0b9938cc1b76840b1741ca0c21f9fd0340e39fd1866b28002b6be33d66705040d0cc1cde1622858fd13f63581a106c629998103cda0c61802ef82
-
SSDEEP
12288:jx9bxAtPcU6YEo48WgxFOMKefOrVJ6Hw8z/lwiUov:jx9b2tcnYEo3zybefcJR8z/lwiUo
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Suspicious use of SetThreadContext
-