General
-
Target
JaffaCakes118_651b487fd423ec8448f11d23f500ec10
-
Size
385KB
-
Sample
250102-ppntjssjcx
-
MD5
651b487fd423ec8448f11d23f500ec10
-
SHA1
da43197862d2a936b55f96901d12c87f0db983d8
-
SHA256
c5f3b728dab3b946f80e363c354d5821d87e67d0d27e2b938bb395e64565ff88
-
SHA512
bf3508bb2719968aa1b924a073f5e67ac901b26adf1e1b0f834260e3618066cad1aa5029769b539d579408aa80c6c81d07b55328868c778ff50a8ff73dfece1b
-
SSDEEP
6144:Oex5IamdAAdX+UkKK0r6vpjzWPu9XQRXKJYO3snCo9UJPHmViI:N5IaiAALKmWJWPyXkrksnCWyO
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_651b487fd423ec8448f11d23f500ec10.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_651b487fd423ec8448f11d23f500ec10.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_651b487fd423ec8448f11d23f500ec10
-
Size
385KB
-
MD5
651b487fd423ec8448f11d23f500ec10
-
SHA1
da43197862d2a936b55f96901d12c87f0db983d8
-
SHA256
c5f3b728dab3b946f80e363c354d5821d87e67d0d27e2b938bb395e64565ff88
-
SHA512
bf3508bb2719968aa1b924a073f5e67ac901b26adf1e1b0f834260e3618066cad1aa5029769b539d579408aa80c6c81d07b55328868c778ff50a8ff73dfece1b
-
SSDEEP
6144:Oex5IamdAAdX+UkKK0r6vpjzWPu9XQRXKJYO3snCo9UJPHmViI:N5IaiAALKmWJWPyXkrksnCWyO
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Isrstealer family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-