General
-
Target
f4406df1b0ca5dc97b1f0d2f57102e27_JaffaCakes118
-
Size
1.5MB
-
Sample
240416-y471eadc4y
-
MD5
f4406df1b0ca5dc97b1f0d2f57102e27
-
SHA1
397851638f1cc999615aeca911a1a02a180b5d99
-
SHA256
460ece62f40e00fbde378d890513acb09f03fb2f4a8da93b6305a0df0c5544dd
-
SHA512
8d04d63fdc2849013f624b2a692e10e5076d8e8b6c5635d939bd096ab8d54361625cb086990a7192cc0adb0629f839467f9212dab8b86f33eeede2130657e978
-
SSDEEP
24576:yzoIWmb+Mg2gRVyt5OgPf4Am4H+SHLw78aUOGemKDL0dlRG95WN90bc:yzovmbgRVCJP/HLUnUO8KDL0dno58ib
Static task
static1
Behavioral task
behavioral1
Sample
f4406df1b0ca5dc97b1f0d2f57102e27_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f4406df1b0ca5dc97b1f0d2f57102e27_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.crmsynergies.xyz - Port:
587 - Username:
[email protected] - Password:
qWU#FcYx(9
Targets
-
-
Target
f4406df1b0ca5dc97b1f0d2f57102e27_JaffaCakes118
-
Size
1.5MB
-
MD5
f4406df1b0ca5dc97b1f0d2f57102e27
-
SHA1
397851638f1cc999615aeca911a1a02a180b5d99
-
SHA256
460ece62f40e00fbde378d890513acb09f03fb2f4a8da93b6305a0df0c5544dd
-
SHA512
8d04d63fdc2849013f624b2a692e10e5076d8e8b6c5635d939bd096ab8d54361625cb086990a7192cc0adb0629f839467f9212dab8b86f33eeede2130657e978
-
SSDEEP
24576:yzoIWmb+Mg2gRVyt5OgPf4Am4H+SHLw78aUOGemKDL0dlRG95WN90bc:yzovmbgRVCJP/HLUnUO8KDL0dno58ib
-
Detect ZGRat V1
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-