General
-
Target
ee012ccf95286d03ea9cc4d508fee46e_JaffaCakes118
-
Size
780KB
-
Sample
240411-wfpstagf64
-
MD5
ee012ccf95286d03ea9cc4d508fee46e
-
SHA1
03d86e7dad5b312e03bd3d928c1514f293d79051
-
SHA256
2f9c6244fa0ed0d62188100de444fdd5244a3930ba845d5615322ff89e85bbf8
-
SHA512
c9c95663c3a5e25d8e0d97870387b7ca7a735409297655c590f3117299b3feda7c47dd476ac8e207259f5ead961fe77dbbc5f1b3a2defbb99531bf78e3d656f2
-
SSDEEP
12288:0l6ttSwR5amrYMNygJvPch2tFbwv7IhpSxITamCTnKeWzzJnWqN2Ev2K1Bc5BmM0:ryk5nCIhx6B
Static task
static1
Behavioral task
behavioral1
Sample
ee012ccf95286d03ea9cc4d508fee46e_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
matiex
https://api.telegram.org/bot1395392888:AAFrJovDdZICOFB0gX0eGWrAUzEKCRpv8xo/sendMessage?chat_id=1300181783
Targets
-
-
Target
ee012ccf95286d03ea9cc4d508fee46e_JaffaCakes118
-
Size
780KB
-
MD5
ee012ccf95286d03ea9cc4d508fee46e
-
SHA1
03d86e7dad5b312e03bd3d928c1514f293d79051
-
SHA256
2f9c6244fa0ed0d62188100de444fdd5244a3930ba845d5615322ff89e85bbf8
-
SHA512
c9c95663c3a5e25d8e0d97870387b7ca7a735409297655c590f3117299b3feda7c47dd476ac8e207259f5ead961fe77dbbc5f1b3a2defbb99531bf78e3d656f2
-
SSDEEP
12288:0l6ttSwR5amrYMNygJvPch2tFbwv7IhpSxITamCTnKeWzzJnWqN2Ev2K1Bc5BmM0:ryk5nCIhx6B
-
Detect ZGRat V1
-
Matiex Main payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-