General
-
Target
e87a68565079ec9337b38daf24abb7ed_JaffaCakes118
-
Size
567KB
-
Sample
241212-1xjqca1jeq
-
MD5
e87a68565079ec9337b38daf24abb7ed
-
SHA1
37cc35d9cdf9b1b372c9b6798fc01fa4b320639c
-
SHA256
0734e46043e3b7a82176386c4c8d5f572fb9673c94d4047a370a25c1035c87ce
-
SHA512
6f3f6ba6f26f10b942db0d002487f356bdc9045cf312d46a55b7f31343eac9599be43bb8eb2fd35cae9ca3a2fa895384fc88f3d97780fad33d9b866c08c8eb23
-
SSDEEP
6144:sYLtsu1F9czs6SNy1bveBJIMPlYkZmOgSnMA4Csn7OiiqLIKu3G8qyWg+RB:L1F9czs6WyCJ/PlBnp/mIv3yyW
Static task
static1
Behavioral task
behavioral1
Sample
e87a68565079ec9337b38daf24abb7ed_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e87a68565079ec9337b38daf24abb7ed_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
e87a68565079ec9337b38daf24abb7ed_JaffaCakes118
-
Size
567KB
-
MD5
e87a68565079ec9337b38daf24abb7ed
-
SHA1
37cc35d9cdf9b1b372c9b6798fc01fa4b320639c
-
SHA256
0734e46043e3b7a82176386c4c8d5f572fb9673c94d4047a370a25c1035c87ce
-
SHA512
6f3f6ba6f26f10b942db0d002487f356bdc9045cf312d46a55b7f31343eac9599be43bb8eb2fd35cae9ca3a2fa895384fc88f3d97780fad33d9b866c08c8eb23
-
SSDEEP
6144:sYLtsu1F9czs6SNy1bveBJIMPlYkZmOgSnMA4Csn7OiiqLIKu3G8qyWg+RB:L1F9czs6WyCJ/PlBnp/mIv3yyW
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Isrstealer family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1