General
-
Target
e67bc886e8798b8be7e70ef019905f1e_JaffaCakes118
-
Size
236KB
-
Sample
240917-k3s8zavekp
-
MD5
e67bc886e8798b8be7e70ef019905f1e
-
SHA1
3b06c51faf0f481ba8ddbb1310b498e91137f914
-
SHA256
22d26657b04833d870e70a9c23980595771a6cff35fa59f984809ffdfd77a0d0
-
SHA512
5eefceeb6cb1dc4745e8bbb3641a3222011440bdf471ec63001a5a2688b0098276ee2c8d87da085650e5bf42efed23ec45867f0960d973022238b8b393fce92c
-
SSDEEP
6144:qnBp3Xn2fG39j/N2UtcyiHbdCmqorFJnSSUl:6p139P07PXrzSSUl
Static task
static1
Behavioral task
behavioral1
Sample
e67bc886e8798b8be7e70ef019905f1e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e67bc886e8798b8be7e70ef019905f1e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
e67bc886e8798b8be7e70ef019905f1e_JaffaCakes118
-
Size
236KB
-
MD5
e67bc886e8798b8be7e70ef019905f1e
-
SHA1
3b06c51faf0f481ba8ddbb1310b498e91137f914
-
SHA256
22d26657b04833d870e70a9c23980595771a6cff35fa59f984809ffdfd77a0d0
-
SHA512
5eefceeb6cb1dc4745e8bbb3641a3222011440bdf471ec63001a5a2688b0098276ee2c8d87da085650e5bf42efed23ec45867f0960d973022238b8b393fce92c
-
SSDEEP
6144:qnBp3Xn2fG39j/N2UtcyiHbdCmqorFJnSSUl:6p139P07PXrzSSUl
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-