General
-
Target
fa0a3ed04eec65d6d3fb55aa7d2497c1_JaffaCakes118
-
Size
1.3MB
-
Sample
240419-ltzvtseb58
-
MD5
fa0a3ed04eec65d6d3fb55aa7d2497c1
-
SHA1
89aafe0cfec4ecc13fd7f255b1e6e8af903ddbd0
-
SHA256
2c6df9a84b482c1dd1af8ee142ccdfeab23234a8507f3cc637aee9161a6c58b8
-
SHA512
da69f632f0bc9789bf17d1cfdbf09c991098227a23e3bd273c1c5720b53d9eb81b99c0121f632cbc2eb25ece51e6548470dc2fd0ed64d37f88a58a005b1c7b3d
-
SSDEEP
24576:inGai6Dban0+uhHJQNmj3X2rhK1+pSRs/8Mz3g:T6iuNH261Rs/
Static task
static1
Behavioral task
behavioral1
Sample
fa0a3ed04eec65d6d3fb55aa7d2497c1_JaffaCakes118.exe
Resource
win7-20231129-en
Malware Config
Targets
-
-
Target
fa0a3ed04eec65d6d3fb55aa7d2497c1_JaffaCakes118
-
Size
1.3MB
-
MD5
fa0a3ed04eec65d6d3fb55aa7d2497c1
-
SHA1
89aafe0cfec4ecc13fd7f255b1e6e8af903ddbd0
-
SHA256
2c6df9a84b482c1dd1af8ee142ccdfeab23234a8507f3cc637aee9161a6c58b8
-
SHA512
da69f632f0bc9789bf17d1cfdbf09c991098227a23e3bd273c1c5720b53d9eb81b99c0121f632cbc2eb25ece51e6548470dc2fd0ed64d37f88a58a005b1c7b3d
-
SSDEEP
24576:inGai6Dban0+uhHJQNmj3X2rhK1+pSRs/8Mz3g:T6iuNH261Rs/
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-