General
-
Target
35a17271da1a5f66444b085d959e0c9b_JaffaCakes118
-
Size
1.1MB
-
Sample
241011-tfrajawanj
-
MD5
35a17271da1a5f66444b085d959e0c9b
-
SHA1
ea76bfbc822f55ec1a1d3fe344d8abcc0e677553
-
SHA256
6297c416960bf4cba1132068c6db37874c3fec70e641b3200ab9c84b56d4b196
-
SHA512
96ab18423db1d9b9c689f4801d6e6bd51caa2c0b0258272bcc24bca4cfbe510a84249a025c5c53547b00947916b0c7b364163f87e0f1e9ff70601987fd9adb8f
-
SSDEEP
24576:yNV/yP0x2lw0AzLNH2smWuaG7c1W1UiNJGnf:GyP04wNtmWu1kW1
Static task
static1
Behavioral task
behavioral1
Sample
35a17271da1a5f66444b085d959e0c9b_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
35a17271da1a5f66444b085d959e0c9b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
35a17271da1a5f66444b085d959e0c9b_JaffaCakes118
-
Size
1.1MB
-
MD5
35a17271da1a5f66444b085d959e0c9b
-
SHA1
ea76bfbc822f55ec1a1d3fe344d8abcc0e677553
-
SHA256
6297c416960bf4cba1132068c6db37874c3fec70e641b3200ab9c84b56d4b196
-
SHA512
96ab18423db1d9b9c689f4801d6e6bd51caa2c0b0258272bcc24bca4cfbe510a84249a025c5c53547b00947916b0c7b364163f87e0f1e9ff70601987fd9adb8f
-
SSDEEP
24576:yNV/yP0x2lw0AzLNH2smWuaG7c1W1UiNJGnf:GyP04wNtmWu1kW1
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-