General
-
Target
JaffaCakes118_7bddbb6e8ef452ccfae39772e1e65611
-
Size
260KB
-
Sample
250104-1fnmzazqfq
-
MD5
7bddbb6e8ef452ccfae39772e1e65611
-
SHA1
9be5b0d96f4a8bfe0e64e4f05e3ce2ed9eebc6c7
-
SHA256
f523c4ef34854da34a4dd80ffe9019b856b5343d59ab4039df9505fb73f747d5
-
SHA512
2d981618b7c3011d594b9e315107f3ad209932d613ed9aa120c96cad99bf34bfc4404ddf9c2230ac3d8247c151ffe9f4846de2e7fc15d5d1514bf8ebf405efb6
-
SSDEEP
6144:vYb//1PxwMdIKCC0ef//uXltKc+LVsz9b8R4jvLXou:FMdFeCXuLKcCVsz6SDLXo
Behavioral task
behavioral1
Sample
JaffaCakes118_7bddbb6e8ef452ccfae39772e1e65611.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7bddbb6e8ef452ccfae39772e1e65611.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_7bddbb6e8ef452ccfae39772e1e65611
-
Size
260KB
-
MD5
7bddbb6e8ef452ccfae39772e1e65611
-
SHA1
9be5b0d96f4a8bfe0e64e4f05e3ce2ed9eebc6c7
-
SHA256
f523c4ef34854da34a4dd80ffe9019b856b5343d59ab4039df9505fb73f747d5
-
SHA512
2d981618b7c3011d594b9e315107f3ad209932d613ed9aa120c96cad99bf34bfc4404ddf9c2230ac3d8247c151ffe9f4846de2e7fc15d5d1514bf8ebf405efb6
-
SSDEEP
6144:vYb//1PxwMdIKCC0ef//uXltKc+LVsz9b8R4jvLXou:FMdFeCXuLKcCVsz6SDLXo
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
Isrstealer family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-