General
-
Target
edeb05bbb74861fae1d5a5825fa6983b_JaffaCakes118
-
Size
224KB
-
Sample
240920-s8gq5avcrk
-
MD5
edeb05bbb74861fae1d5a5825fa6983b
-
SHA1
1a0e67f666c48d7fecf471132c028b94e7adf9ea
-
SHA256
89ec5d0f968479ce1cec3e7ed31bf5de92dec4101754a6e27660416bb39d32a5
-
SHA512
72c223b261e964059507ea8a648d339b9c6e1acb6aa9aad7a82b44e1d0ee7e2449681fe867a362c35cabadf37228b255a13b78baddab087a4331f8a9e46f032c
-
SSDEEP
3072:d8lk0HvEKFZsDK8auN2Kfji9vCXwFZxzsMaDuyIX4NqIYTDQgfc+lNTFCuNiV39q:dQHvVEKeQBT4N6yIX4N9Y90+ldF/NiV
Static task
static1
Behavioral task
behavioral1
Sample
edeb05bbb74861fae1d5a5825fa6983b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edeb05bbb74861fae1d5a5825fa6983b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
edeb05bbb74861fae1d5a5825fa6983b_JaffaCakes118
-
Size
224KB
-
MD5
edeb05bbb74861fae1d5a5825fa6983b
-
SHA1
1a0e67f666c48d7fecf471132c028b94e7adf9ea
-
SHA256
89ec5d0f968479ce1cec3e7ed31bf5de92dec4101754a6e27660416bb39d32a5
-
SHA512
72c223b261e964059507ea8a648d339b9c6e1acb6aa9aad7a82b44e1d0ee7e2449681fe867a362c35cabadf37228b255a13b78baddab087a4331f8a9e46f032c
-
SSDEEP
3072:d8lk0HvEKFZsDK8auN2Kfji9vCXwFZxzsMaDuyIX4NqIYTDQgfc+lNTFCuNiV39q:dQHvVEKeQBT4N6yIX4N9Y90+ldF/NiV
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-