General
-
Target
e254de2ef839220866627984a0a85b6c_JaffaCakes118
-
Size
921KB
-
Sample
241211-t32psavqal
-
MD5
e254de2ef839220866627984a0a85b6c
-
SHA1
03a9f17b3f7da292394553dc2dcdd01cfb210ca7
-
SHA256
dc9ccaaac633ec7c47aea91fa1779d800a66f157864d0e2642455430fabc9b1d
-
SHA512
2c5c6d3946a4966f25af9764eaef86bb73f2afc7e1b815d5c2b758cc4d274e4aca1ef09ffcb169809e00299921c077fefad88a8b5c9a63181a33d1ff1e129b10
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaC8W5rtbvw1+rT5Xe:7JZoQrbTFZY1iaC9RzU+Q
Static task
static1
Behavioral task
behavioral1
Sample
e254de2ef839220866627984a0a85b6c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e254de2ef839220866627984a0a85b6c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
e254de2ef839220866627984a0a85b6c_JaffaCakes118
-
Size
921KB
-
MD5
e254de2ef839220866627984a0a85b6c
-
SHA1
03a9f17b3f7da292394553dc2dcdd01cfb210ca7
-
SHA256
dc9ccaaac633ec7c47aea91fa1779d800a66f157864d0e2642455430fabc9b1d
-
SHA512
2c5c6d3946a4966f25af9764eaef86bb73f2afc7e1b815d5c2b758cc4d274e4aca1ef09ffcb169809e00299921c077fefad88a8b5c9a63181a33d1ff1e129b10
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaC8W5rtbvw1+rT5Xe:7JZoQrbTFZY1iaC9RzU+Q
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Isrstealer family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-