General
-
Target
JaffaCakes118_d92a907d735a8937e7fdb7b6163f48be
-
Size
1.3MB
-
Sample
250110-dg3rysskeq
-
MD5
d92a907d735a8937e7fdb7b6163f48be
-
SHA1
841fdfc69ad20ebb18857449dcd5817d49f49339
-
SHA256
24ea81e04618ce6884bd241fa03f7dea6e8eed01d4c3e3dc2a5fd2410187b60d
-
SHA512
9bf995b8699ca3ad1d93dd14648732a955d5dced1172ec3429a310f41300fa4b7de4c6c30808a30d509e2398e993c99782f724cf0419df652bf4829bfaa9105f
-
SSDEEP
24576:fNR2zaQBt37/CZ0w1PeWnzqhqCC6+PEDwXZV9q5Rem/QWLsiM:mUsrC6aEkVb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d92a907d735a8937e7fdb7b6163f48be.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d92a907d735a8937e7fdb7b6163f48be.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_d92a907d735a8937e7fdb7b6163f48be
-
Size
1.3MB
-
MD5
d92a907d735a8937e7fdb7b6163f48be
-
SHA1
841fdfc69ad20ebb18857449dcd5817d49f49339
-
SHA256
24ea81e04618ce6884bd241fa03f7dea6e8eed01d4c3e3dc2a5fd2410187b60d
-
SHA512
9bf995b8699ca3ad1d93dd14648732a955d5dced1172ec3429a310f41300fa4b7de4c6c30808a30d509e2398e993c99782f724cf0419df652bf4829bfaa9105f
-
SSDEEP
24576:fNR2zaQBt37/CZ0w1PeWnzqhqCC6+PEDwXZV9q5Rem/QWLsiM:mUsrC6aEkVb
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Isrstealer family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-