General
-
Target
JaffaCakes118_a46ac4796ed318b7db93be19b00cc9d3
-
Size
312KB
-
Sample
250205-2gn6kawqdl
-
MD5
a46ac4796ed318b7db93be19b00cc9d3
-
SHA1
7e46db664707ad03fcd8edfcfde2351c11335a91
-
SHA256
94a0098933047c318a0b508e09edc22794f126adcd7946b00dd874cd50405b8e
-
SHA512
51cf7c3921a96942fb212753dff5c21adc866fb357f9395af6e32ef0b61ba1f459e858494c9c2643917945e89e5b0018c16a4a42b0d5b09fd0837b48272d4f75
-
SSDEEP
6144:aP2ZAmxWjfP5YVtt85LRDPt7p9WmKzlja5Cl8bIBlq7wi:aPpb5A8BpV99WBw5CKbIIwi
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a46ac4796ed318b7db93be19b00cc9d3.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a46ac4796ed318b7db93be19b00cc9d3.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
JaffaCakes118_a46ac4796ed318b7db93be19b00cc9d3
-
Size
312KB
-
MD5
a46ac4796ed318b7db93be19b00cc9d3
-
SHA1
7e46db664707ad03fcd8edfcfde2351c11335a91
-
SHA256
94a0098933047c318a0b508e09edc22794f126adcd7946b00dd874cd50405b8e
-
SHA512
51cf7c3921a96942fb212753dff5c21adc866fb357f9395af6e32ef0b61ba1f459e858494c9c2643917945e89e5b0018c16a4a42b0d5b09fd0837b48272d4f75
-
SSDEEP
6144:aP2ZAmxWjfP5YVtt85LRDPt7p9WmKzlja5Cl8bIBlq7wi:aPpb5A8BpV99WBw5CKbIIwi
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Isrstealer family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-