General
-
Target
JaffaCakes118_5119b8df58fae088f338fb83d9a2b3bc
-
Size
933KB
-
Sample
250129-bfktmsyqfl
-
MD5
5119b8df58fae088f338fb83d9a2b3bc
-
SHA1
5d6ffd11b68784c6342dc03a044fea4f2550ee1f
-
SHA256
936daa7b23217158833c1e1b9b05a1ebfb07caa12ad53d11481f2c510f30d6fb
-
SHA512
83a0df00d54c89d5f624a211a8f84d421e57d452dd8aa9439822ca218835f8980d149eb392d2adae4064f8a0cafeb2e9c9c46b32c9130b00ee93e0eb1a592e88
-
SSDEEP
12288:ApegXVGSgu10Vdx2mT0tL5kDrPrIrpJl3FbONGNT19Himy8H4CNjGzwUOOUjjoKc:AZsSaQ4PAZ2CJxHjjohNb4i
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5119b8df58fae088f338fb83d9a2b3bc.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5119b8df58fae088f338fb83d9a2b3bc.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
JaffaCakes118_5119b8df58fae088f338fb83d9a2b3bc
-
Size
933KB
-
MD5
5119b8df58fae088f338fb83d9a2b3bc
-
SHA1
5d6ffd11b68784c6342dc03a044fea4f2550ee1f
-
SHA256
936daa7b23217158833c1e1b9b05a1ebfb07caa12ad53d11481f2c510f30d6fb
-
SHA512
83a0df00d54c89d5f624a211a8f84d421e57d452dd8aa9439822ca218835f8980d149eb392d2adae4064f8a0cafeb2e9c9c46b32c9130b00ee93e0eb1a592e88
-
SSDEEP
12288:ApegXVGSgu10Vdx2mT0tL5kDrPrIrpJl3FbONGNT19Himy8H4CNjGzwUOOUjjoKc:AZsSaQ4PAZ2CJxHjjohNb4i
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Isrstealer family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1