General
-
Target
7272a067ec56ecfc93f31af259bb1cd6_JaffaCakes118
-
Size
671KB
-
Sample
241024-fvbxhavfld
-
MD5
7272a067ec56ecfc93f31af259bb1cd6
-
SHA1
526e98c0d12875fd13e217a8c04b1c8ece14c334
-
SHA256
f00b288866cf27c4219022b29cc90522f05e4af18c9a842e6087c01a7c4e3bed
-
SHA512
7d9dcf47f6d45794262c6dfa01b71d2b8dfa4b7cf625e5a14d42936e072514dc25d5fd6e92e448dae7b9a08f8404d38e3e2c1101497da1b47a89a20369bce3cd
-
SSDEEP
12288:q/h70lWElp014hoE7mUQElmm/0LxFHysxziHZOWltpTCka:q/hGFlS1aoEhMLHHysoNTCka
Static task
static1
Behavioral task
behavioral1
Sample
7272a067ec56ecfc93f31af259bb1cd6_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7272a067ec56ecfc93f31af259bb1cd6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7272a067ec56ecfc93f31af259bb1cd6_JaffaCakes118
-
Size
671KB
-
MD5
7272a067ec56ecfc93f31af259bb1cd6
-
SHA1
526e98c0d12875fd13e217a8c04b1c8ece14c334
-
SHA256
f00b288866cf27c4219022b29cc90522f05e4af18c9a842e6087c01a7c4e3bed
-
SHA512
7d9dcf47f6d45794262c6dfa01b71d2b8dfa4b7cf625e5a14d42936e072514dc25d5fd6e92e448dae7b9a08f8404d38e3e2c1101497da1b47a89a20369bce3cd
-
SSDEEP
12288:q/h70lWElp014hoE7mUQElmm/0LxFHysxziHZOWltpTCka:q/hGFlS1aoEhMLHHysoNTCka
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-