General
-
Target
JaffaCakes118_948d1a5feca77f43e96988e923182315
-
Size
404KB
-
Sample
250329-x32lka1vhz
-
MD5
948d1a5feca77f43e96988e923182315
-
SHA1
279484d086ac209217dec5572dfde14528dfceda
-
SHA256
d60f48dae99039d7aa7e522c0b25217954345efb91ffca77cd5cb1bacd52df30
-
SHA512
91819811553ddc79c40a3621dfff4eb447c35765ce6d490fb5c23140c851c9ffee8847bd859da3bd600d6e5cbcdd07e0df8e9d867db61b0dc2d30586e0eaf7ba
-
SSDEEP
6144:OdiQS0Nluv18K0UF4csKa7YTHKTXxNteM3dauJqxbvkP0GbSI/KN/7SNw:OdiQS0ruv1b0U6qmBNxguJq5vEOs
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_948d1a5feca77f43e96988e923182315.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_948d1a5feca77f43e96988e923182315.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
JaffaCakes118_948d1a5feca77f43e96988e923182315
-
Size
404KB
-
MD5
948d1a5feca77f43e96988e923182315
-
SHA1
279484d086ac209217dec5572dfde14528dfceda
-
SHA256
d60f48dae99039d7aa7e522c0b25217954345efb91ffca77cd5cb1bacd52df30
-
SHA512
91819811553ddc79c40a3621dfff4eb447c35765ce6d490fb5c23140c851c9ffee8847bd859da3bd600d6e5cbcdd07e0df8e9d867db61b0dc2d30586e0eaf7ba
-
SSDEEP
6144:OdiQS0Nluv18K0UF4csKa7YTHKTXxNteM3dauJqxbvkP0GbSI/KN/7SNw:OdiQS0ruv1b0U6qmBNxguJq5vEOs
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Isrstealer family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-