General
-
Target
8269b1107aeefdb83374ecc9149878f5_JaffaCakes118
-
Size
269KB
-
Sample
241031-jz9acavaqb
-
MD5
8269b1107aeefdb83374ecc9149878f5
-
SHA1
274e6dabe1574074fc4303167030fd21d184789e
-
SHA256
7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c
-
SHA512
f16f8c9812fd1b56093882f9d8d3bdcabb43d1fbdcedbfe6bd83cf820316a7b772a913d5a6ce61957c676f6057f9aac614a072bcbdd320c8b52379d937949b3b
-
SSDEEP
6144:BP8ilqgFAjN98/Un8Ple1evMigXAuQoYE1R:BP8ilPKROs8JvNgXBQPE1
Static task
static1
Behavioral task
behavioral1
Sample
8269b1107aeefdb83374ecc9149878f5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8269b1107aeefdb83374ecc9149878f5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
8269b1107aeefdb83374ecc9149878f5_JaffaCakes118
-
Size
269KB
-
MD5
8269b1107aeefdb83374ecc9149878f5
-
SHA1
274e6dabe1574074fc4303167030fd21d184789e
-
SHA256
7cc8c112ed99935b0a69b1ddd4fe672eaab54310b75e467ca1485b0a2e589a1c
-
SHA512
f16f8c9812fd1b56093882f9d8d3bdcabb43d1fbdcedbfe6bd83cf820316a7b772a913d5a6ce61957c676f6057f9aac614a072bcbdd320c8b52379d937949b3b
-
SSDEEP
6144:BP8ilqgFAjN98/Un8Ple1evMigXAuQoYE1R:BP8ilPKROs8JvNgXBQPE1
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Isrstealer family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1