General
-
Target
eb9c1e590efe43a4e30b614657e68fd0_JaffaCakes118
-
Size
484KB
-
Sample
240410-v2jm9aaa8x
-
MD5
eb9c1e590efe43a4e30b614657e68fd0
-
SHA1
c503a0e0fcee9a1461587830b8d114d33fdd0287
-
SHA256
32cd319e6761e336df91dc0712d9d55068f5c6f8a31eaa4593a4f29430dc8e82
-
SHA512
a726311927ec6be8783b357ffc8e9833c4bc7f31f2d47a05bed71ce59a09985e1a4dc39bd87e4979e0814ac0aea7e22cbcdcb720d05995e74b1e69deb8a21488
-
SSDEEP
12288:xI6Dr6HtQctUGQWgijsqnAy0w9y4jq9y/hmkcKPFM:SecCi/l9y/mh1cYF
Static task
static1
Behavioral task
behavioral1
Sample
eb9c1e590efe43a4e30b614657e68fd0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb9c1e590efe43a4e30b614657e68fd0_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
0
Targets
-
-
Target
eb9c1e590efe43a4e30b614657e68fd0_JaffaCakes118
-
Size
484KB
-
MD5
eb9c1e590efe43a4e30b614657e68fd0
-
SHA1
c503a0e0fcee9a1461587830b8d114d33fdd0287
-
SHA256
32cd319e6761e336df91dc0712d9d55068f5c6f8a31eaa4593a4f29430dc8e82
-
SHA512
a726311927ec6be8783b357ffc8e9833c4bc7f31f2d47a05bed71ce59a09985e1a4dc39bd87e4979e0814ac0aea7e22cbcdcb720d05995e74b1e69deb8a21488
-
SSDEEP
12288:xI6Dr6HtQctUGQWgijsqnAy0w9y4jq9y/hmkcKPFM:SecCi/l9y/mh1cYF
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-