General
-
Target
240421-qe6r2sce7w_pw_infected.zip
-
Size
775KB
-
Sample
240426-3d56cafb3s
-
MD5
7faed85b3127af215f3841d4f8fea3e8
-
SHA1
6510496968f0e0ad546eaa19f9748f2fe1f52f62
-
SHA256
1c742b10c45081fb1d7f64ee7165b66dfa82f05bb5233f5567512043031e2633
-
SHA512
fd873a2527ea2f94fa548c4ce31ad2f9b46622d6b80097933e388ca55c56f876af852cc8986728cad7fc47aebda1695aa24ccd12eced9f482a74157b91babe8c
-
SSDEEP
12288:U8m42d4TwuzIoUoFqo6n7+SvhAzgUS8xN2YpyOhRpyfmRfmnrnW0WjelZWp/q:aBJgW+SvpUrx0Yp7Tpsr1+p/q
Static task
static1
Malware Config
Targets
-
-
Target
ff59b59d6fb138bd3a588d89ea0fa1d7_JaffaCakes118
-
Size
1.3MB
-
MD5
ff59b59d6fb138bd3a588d89ea0fa1d7
-
SHA1
fad22ded5983e8d5a9bffa398c3281670e496f46
-
SHA256
8e1c67e8ed76591ed779773be365b2b66440d958f1bf3556d4512f71836c3d2f
-
SHA512
7c3017e263d812bac1ad57bf4ed4371fe7414cbde8af077e507811a9ce538d1fdbbb5d396f355792dae67cdf9c25e3b0128a036816d74a48ad68c62e5109054e
-
SSDEEP
24576:x6qt46zuDJ+ssHguZbtg2aLJ5eKSKmR9Fmt5J2NY9/:xZqARsV5VmFmzJ2M/
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-