General
-
Target
02be4a5cf4743e305d6cb0498277833e_JaffaCakes118
-
Size
337KB
-
Sample
240930-w8tmgatcre
-
MD5
02be4a5cf4743e305d6cb0498277833e
-
SHA1
d0a650443c767c1b7ddca88e9e430ea009f83e7e
-
SHA256
a52ac716cc69375814d98ffba09cbeb6b50a322bc9499196b16fda2ac84b819a
-
SHA512
57ad5e53a02035868d9b5bb95c0490308eb776b2b4c5c4829796e49cd7b84854140061bc06f3f57bed74554d592d33c87e21057490567ff2b52771bbf2b01bd1
-
SSDEEP
6144:MCZpnhRNGkAb6oOV+7eSEUPZwRRC0ZyHKzLmqbed/+s2TLVlOlebZmbcfTl:rXnhR66QC4hwR7zSAoZ2TLVUleMwfTl
Static task
static1
Behavioral task
behavioral1
Sample
XVCU Keygen/keygen.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XVCU Keygen/keygen.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
XVCU Keygen/keygen.exe
-
Size
424KB
-
MD5
8bdf1e56943249066a5300ddd31d3b3b
-
SHA1
89c07ee977b21595039ad7a7ee94dfb41868a23f
-
SHA256
5a6c4407831f1e2dfcefeec9d8062087a3335387757c07da0f8bcbc838929182
-
SHA512
a180592c084b107f81f807eeed908575faae718ad57129800d0e683f98a09f701f7982dde2e8766bc6500b407005d8a340d03e3aab04351f9e0633b11c534cc2
-
SSDEEP
12288:17J7YiFAI1E/vzM9NsNBB+j+qTangZ3M7h9tcnd7OnTppl:1OiFA4EfBB+tYgZ3M7h9todKTL
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-