General
-
Target
fa4dd7a933a586082814790af58cf8c5_JaffaCakes118
-
Size
4.3MB
-
Sample
240927-nbhjyascpf
-
MD5
fa4dd7a933a586082814790af58cf8c5
-
SHA1
9ddc9c0b84f4e46f6a0eb35f31afa566c4bb00a0
-
SHA256
4d84bba109e2617bc13ecd044862c3f86c375e785437d80accf4a9d90ed11d16
-
SHA512
4e750bf97f67eba9d3a107a198cf9e297e270ae773d181a686bcdf715de2d2558d2e680807031c3f23853c65f627052d2412a7f4c7b995fc3a1ce9badd89c2a3
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
Static task
static1
Behavioral task
behavioral1
Sample
fa4dd7a933a586082814790af58cf8c5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa4dd7a933a586082814790af58cf8c5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
fa4dd7a933a586082814790af58cf8c5_JaffaCakes118
-
Size
4.3MB
-
MD5
fa4dd7a933a586082814790af58cf8c5
-
SHA1
9ddc9c0b84f4e46f6a0eb35f31afa566c4bb00a0
-
SHA256
4d84bba109e2617bc13ecd044862c3f86c375e785437d80accf4a9d90ed11d16
-
SHA512
4e750bf97f67eba9d3a107a198cf9e297e270ae773d181a686bcdf715de2d2558d2e680807031c3f23853c65f627052d2412a7f4c7b995fc3a1ce9badd89c2a3
-
SSDEEP
6144:7/m9kF4LhB959Ak24Fa8yVRasuSuvfQ1dskAsaJraBCDorAB:bfFWB9bpFatVMPfgsVpraB
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-