General
-
Target
fc821e8529a05ff2346691084581455f_JaffaCakes118
-
Size
548KB
-
Sample
240420-l4c4taef4v
-
MD5
fc821e8529a05ff2346691084581455f
-
SHA1
c8e0f21c2689c42b1f3728775ee86b59f0e8b6c6
-
SHA256
d3f2e8ce150805553a634591cc88dcf75942c12039de608c4a0bb204a96d1ae6
-
SHA512
b507e4fe868e68a1982164c64d423da425d050cd66efcf2858ae9648d56971dfbf5fcc9a6a5cbd15d04e82b8dbee4054af9d4edb85bdba12611910108dc13089
-
SSDEEP
12288:2lvvKF1ViO8IV8xy9x51mPpagIwmf4CkC6yQwAci2AGFV:2AF1Vyxxy9x5O8BjPft
Static task
static1
Behavioral task
behavioral1
Sample
fc821e8529a05ff2346691084581455f_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fc821e8529a05ff2346691084581455f_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
fc821e8529a05ff2346691084581455f_JaffaCakes118
-
Size
548KB
-
MD5
fc821e8529a05ff2346691084581455f
-
SHA1
c8e0f21c2689c42b1f3728775ee86b59f0e8b6c6
-
SHA256
d3f2e8ce150805553a634591cc88dcf75942c12039de608c4a0bb204a96d1ae6
-
SHA512
b507e4fe868e68a1982164c64d423da425d050cd66efcf2858ae9648d56971dfbf5fcc9a6a5cbd15d04e82b8dbee4054af9d4edb85bdba12611910108dc13089
-
SSDEEP
12288:2lvvKF1ViO8IV8xy9x51mPpagIwmf4CkC6yQwAci2AGFV:2AF1Vyxxy9x5O8BjPft
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-