General
-
Target
ef7c6cf6805e5a2f7ffac43da977e4c8_JaffaCakes118
-
Size
5.9MB
-
Sample
240921-k87njsvdjb
-
MD5
ef7c6cf6805e5a2f7ffac43da977e4c8
-
SHA1
811b43c06d58dcaf9ee4f5e62e2ec834104c1293
-
SHA256
93ef7eb19d5707f86cfae9a0129662ef09ad32897bb4fe3981c09a193ab9b056
-
SHA512
e2726e3d463f09bdcfd176c6a77479d186dcaea25ca5bd92dfa93e3093c1c64e3362fccf58fb0ce53bff47fa6bc68d0d577a9d7af43a653b65743ddfd8bd64b1
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
Static task
static1
Behavioral task
behavioral1
Sample
ef7c6cf6805e5a2f7ffac43da977e4c8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef7c6cf6805e5a2f7ffac43da977e4c8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
ef7c6cf6805e5a2f7ffac43da977e4c8_JaffaCakes118
-
Size
5.9MB
-
MD5
ef7c6cf6805e5a2f7ffac43da977e4c8
-
SHA1
811b43c06d58dcaf9ee4f5e62e2ec834104c1293
-
SHA256
93ef7eb19d5707f86cfae9a0129662ef09ad32897bb4fe3981c09a193ab9b056
-
SHA512
e2726e3d463f09bdcfd176c6a77479d186dcaea25ca5bd92dfa93e3093c1c64e3362fccf58fb0ce53bff47fa6bc68d0d577a9d7af43a653b65743ddfd8bd64b1
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-