General
-
Target
JaffaCakes118_97c58b8ea171d3f901800e34c69141c3
-
Size
1.9MB
-
Sample
250329-y456tatrw4
-
MD5
97c58b8ea171d3f901800e34c69141c3
-
SHA1
5a1cf7700ee264cface9968ffcd749527ef51992
-
SHA256
2f1f52855d71e532c986d86aaeb5753ad4b678b512ef056a8c2260612dccbb82
-
SHA512
13c0dfb88cd0d33cd5af2dc0ada29ae645052beec0d718c43a6cd278d57effa3c8d402455022bc3ed4217c484041da851e9189ebc7c12a252770a940f6c5813e
-
SSDEEP
49152:VeOYNw8+Cu9ifT5KzyrOTFfoPebTxc4w6SkN:VjtoVKzyrONoPMqkN
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_97c58b8ea171d3f901800e34c69141c3.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_97c58b8ea171d3f901800e34c69141c3
-
Size
1.9MB
-
MD5
97c58b8ea171d3f901800e34c69141c3
-
SHA1
5a1cf7700ee264cface9968ffcd749527ef51992
-
SHA256
2f1f52855d71e532c986d86aaeb5753ad4b678b512ef056a8c2260612dccbb82
-
SHA512
13c0dfb88cd0d33cd5af2dc0ada29ae645052beec0d718c43a6cd278d57effa3c8d402455022bc3ed4217c484041da851e9189ebc7c12a252770a940f6c5813e
-
SSDEEP
49152:VeOYNw8+Cu9ifT5KzyrOTFfoPebTxc4w6SkN:VjtoVKzyrONoPMqkN
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Isrstealer family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-