General
-
Target
f61be28bb9b68fecb9551495188f9434_JaffaCakes118
-
Size
487KB
-
Sample
241215-2wpqms1mcx
-
MD5
f61be28bb9b68fecb9551495188f9434
-
SHA1
391d3a38ab1b47605fd9b2e654ba9990e87aa940
-
SHA256
7815ea5f8a696cf2984b02f058c699a3682f9f3aebeb27486e9428194685c3c6
-
SHA512
e581ad123207f84eabf4c93f5bffe7e32c904c90c5f5cc0c3179959af604b9482441842e698b671a0fbbab02b99ef1674c9efef0631b3e0e720c5342c8d56b5e
-
SSDEEP
12288:mNdxlP1UwhjBt8dgOvtdothTheJLyTWOpHOHahuFXHGjZB:mNdxvz2SOboth0hyTXO6hwKL
Static task
static1
Behavioral task
behavioral1
Sample
f61be28bb9b68fecb9551495188f9434_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f61be28bb9b68fecb9551495188f9434_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f61be28bb9b68fecb9551495188f9434_JaffaCakes118
-
Size
487KB
-
MD5
f61be28bb9b68fecb9551495188f9434
-
SHA1
391d3a38ab1b47605fd9b2e654ba9990e87aa940
-
SHA256
7815ea5f8a696cf2984b02f058c699a3682f9f3aebeb27486e9428194685c3c6
-
SHA512
e581ad123207f84eabf4c93f5bffe7e32c904c90c5f5cc0c3179959af604b9482441842e698b671a0fbbab02b99ef1674c9efef0631b3e0e720c5342c8d56b5e
-
SSDEEP
12288:mNdxlP1UwhjBt8dgOvtdothTheJLyTWOpHOHahuFXHGjZB:mNdxvz2SOboth0hyTXO6hwKL
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Isrstealer family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-