General
-
Target
b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118
-
Size
420KB
-
Sample
241202-dcxeda1ler
-
MD5
b6702cda80a4d3509d2e55688c05c9b5
-
SHA1
741c0c7a1132eaa8cbdbfca3ccf525270674dedc
-
SHA256
848f7ba6105563c59127e9bd0eda01bf75271fc1a1570584c98cabf7057bbcf1
-
SHA512
be3cf06539bd2ea3653d3f509eaa38e19754430795f6540f914d71808da6938e563fb45d2da8ee936953c42d63ad6786893b572cb523afb257df58b1ce0356a5
-
SSDEEP
6144:uRwPY8LCpho2fDgej7X0tuNC/Kx9APf8ERgFFvpb1V9qrVwe3ru8cPj:nPY8LCp1h7T/kSFFvjVfMu8cPj
Static task
static1
Behavioral task
behavioral1
Sample
b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118
-
Size
420KB
-
MD5
b6702cda80a4d3509d2e55688c05c9b5
-
SHA1
741c0c7a1132eaa8cbdbfca3ccf525270674dedc
-
SHA256
848f7ba6105563c59127e9bd0eda01bf75271fc1a1570584c98cabf7057bbcf1
-
SHA512
be3cf06539bd2ea3653d3f509eaa38e19754430795f6540f914d71808da6938e563fb45d2da8ee936953c42d63ad6786893b572cb523afb257df58b1ce0356a5
-
SSDEEP
6144:uRwPY8LCpho2fDgej7X0tuNC/Kx9APf8ERgFFvpb1V9qrVwe3ru8cPj:nPY8LCp1h7T/kSFFvjVfMu8cPj
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Isrstealer family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-