General
-
Target
JaffaCakes118_6d2a7770d449ca77cdbaf19427f8df79
-
Size
1.7MB
-
Sample
250131-xwajhawqak
-
MD5
6d2a7770d449ca77cdbaf19427f8df79
-
SHA1
bf9c217cbc4577bc16d6e696974d22b17e8f3c64
-
SHA256
50c3713014eefe6d7a2776d34cc38160f32b1154d0fde6539e506a6fcaf66196
-
SHA512
21c8877a24344ee8f3b7ab4d4e3fe0ffdc7aa28b8b28e3bf91742918b9e069d788363acf8ff3dfad742e8ce6505983db502a94579ffee3f3ca46f2dd9605653c
-
SSDEEP
49152:v7PcpfOyQmi8yhCNhak8xZ/tJbE/97lGWW868Ie97V:vUfOyVi8yhvk8xZHbE/90WW82u5
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6d2a7770d449ca77cdbaf19427f8df79.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6d2a7770d449ca77cdbaf19427f8df79.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
JaffaCakes118_6d2a7770d449ca77cdbaf19427f8df79
-
Size
1.7MB
-
MD5
6d2a7770d449ca77cdbaf19427f8df79
-
SHA1
bf9c217cbc4577bc16d6e696974d22b17e8f3c64
-
SHA256
50c3713014eefe6d7a2776d34cc38160f32b1154d0fde6539e506a6fcaf66196
-
SHA512
21c8877a24344ee8f3b7ab4d4e3fe0ffdc7aa28b8b28e3bf91742918b9e069d788363acf8ff3dfad742e8ce6505983db502a94579ffee3f3ca46f2dd9605653c
-
SSDEEP
49152:v7PcpfOyQmi8yhCNhak8xZ/tJbE/97lGWW868Ie97V:vUfOyVi8yhvk8xZHbE/90WW82u5
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Isrstealer family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-