General
-
Target
JaffaCakes118_6a578b50b62fa21da49e9368b1de3fa0
-
Size
657KB
-
Sample
250103-fhhvaasrcl
-
MD5
6a578b50b62fa21da49e9368b1de3fa0
-
SHA1
dbbf4a09afb8fd6effe5791b4fd1774f31135768
-
SHA256
f2acdba3b1e8794ceb3923de7ca8d192f68894e49b37f84fa6723aeb97366d88
-
SHA512
7cd8a9ef4f346be5d7564863299c43ba1e5abf74ac0547c8e94b98d7ea2ee9996e32c62db3acd1e3d800599089484ea2b65efa547d4c31b0fb26eb0ef8aba803
-
SSDEEP
12288:d4huhKnDCVjOBi4LGqk2YugOpgxA2jkswofn1aKHjl:dguoDoOInL2Vgogh/ww1
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6a578b50b62fa21da49e9368b1de3fa0.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6a578b50b62fa21da49e9368b1de3fa0.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_6a578b50b62fa21da49e9368b1de3fa0
-
Size
657KB
-
MD5
6a578b50b62fa21da49e9368b1de3fa0
-
SHA1
dbbf4a09afb8fd6effe5791b4fd1774f31135768
-
SHA256
f2acdba3b1e8794ceb3923de7ca8d192f68894e49b37f84fa6723aeb97366d88
-
SHA512
7cd8a9ef4f346be5d7564863299c43ba1e5abf74ac0547c8e94b98d7ea2ee9996e32c62db3acd1e3d800599089484ea2b65efa547d4c31b0fb26eb0ef8aba803
-
SSDEEP
12288:d4huhKnDCVjOBi4LGqk2YugOpgxA2jkswofn1aKHjl:dguoDoOInL2Vgogh/ww1
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Isrstealer family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-