General
-
Target
e9cf8e1b64add31f221d25e33f4deaed_JaffaCakes118
-
Size
4.3MB
-
Sample
240918-x1n8fsydne
-
MD5
e9cf8e1b64add31f221d25e33f4deaed
-
SHA1
ed615268f7b3858808458f1bec209facdfcdd5b7
-
SHA256
dd4b08458519d8396e116bc4971a8181a0e2977776070e958f5c9d74e16b48b8
-
SHA512
d6c46dbfacf18ecc1f5dde7899be6207747de24b90d540d17116e4617847df2bef700b166d572604dbc911d923bffc2fb252e2e0a605456af2026cf34b5dd400
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
Static task
static1
Behavioral task
behavioral1
Sample
e9cf8e1b64add31f221d25e33f4deaed_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9cf8e1b64add31f221d25e33f4deaed_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
e9cf8e1b64add31f221d25e33f4deaed_JaffaCakes118
-
Size
4.3MB
-
MD5
e9cf8e1b64add31f221d25e33f4deaed
-
SHA1
ed615268f7b3858808458f1bec209facdfcdd5b7
-
SHA256
dd4b08458519d8396e116bc4971a8181a0e2977776070e958f5c9d74e16b48b8
-
SHA512
d6c46dbfacf18ecc1f5dde7899be6207747de24b90d540d17116e4617847df2bef700b166d572604dbc911d923bffc2fb252e2e0a605456af2026cf34b5dd400
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-