General
-
Target
3a965754e28255e17381331c733a5062_JaffaCakes118
-
Size
740KB
-
Sample
241012-r5s5bawbkf
-
MD5
3a965754e28255e17381331c733a5062
-
SHA1
e33bf2c153528e3ee8a5e5b868062b1b8b455987
-
SHA256
f842d68c4fc549af6ee798769fc0e2eaf3f50f2207d7aadd86b11c1826ef31d6
-
SHA512
ec8e7a3670ed21fc6892ca50268f2e343c7eaa6cc33852753c4924e40b1d1bb69a2657732da12f30ac859535b6696b5c3925636fbc6389257eb478179fd3f98f
-
SSDEEP
6144:K7DUbXf3vrcaqKahsEmtkjIjc2x7bxFVApzL2HcihJ+zzaSfAI0Th5mB/WXPD5Qm:K7gbXf3vriQ7lbypPA9h4XaSfhVo6fv
Static task
static1
Behavioral task
behavioral1
Sample
3a965754e28255e17381331c733a5062_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3a965754e28255e17381331c733a5062_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
3a965754e28255e17381331c733a5062_JaffaCakes118
-
Size
740KB
-
MD5
3a965754e28255e17381331c733a5062
-
SHA1
e33bf2c153528e3ee8a5e5b868062b1b8b455987
-
SHA256
f842d68c4fc549af6ee798769fc0e2eaf3f50f2207d7aadd86b11c1826ef31d6
-
SHA512
ec8e7a3670ed21fc6892ca50268f2e343c7eaa6cc33852753c4924e40b1d1bb69a2657732da12f30ac859535b6696b5c3925636fbc6389257eb478179fd3f98f
-
SSDEEP
6144:K7DUbXf3vrcaqKahsEmtkjIjc2x7bxFVApzL2HcihJ+zzaSfAI0Th5mB/WXPD5Qm:K7gbXf3vriQ7lbypPA9h4XaSfhVo6fv
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-