General
-
Target
136c89acfb542963a9dc99a265c08ee4_JaffaCakes118
-
Size
502KB
-
Sample
240504-tbhgtsdc78
-
MD5
136c89acfb542963a9dc99a265c08ee4
-
SHA1
4364791f14242e2447be844a0fbf9c5b8bbed21b
-
SHA256
422931202dfa4214ad564a05b02b589ab3caeaa343352d4d99c03926918bcd12
-
SHA512
16ceff38dfb2fe45f03f44000e97f2eafecf18df1ccdd15974e867cffad8ae58e0cab82e05525b73af76b1d1117f7a4ff9882e0d316b08b20759ebe2c6247405
-
SSDEEP
6144:2bS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9nHP:2QtqB5urTIoYWBQk1E+VF9mOx9v
Static task
static1
Behavioral task
behavioral1
Sample
136c89acfb542963a9dc99a265c08ee4_JaffaCakes118.exe
Resource
win7-20231129-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.seekscope.com - Port:
587 - Username:
[email protected] - Password:
See1219!
Targets
-
-
Target
136c89acfb542963a9dc99a265c08ee4_JaffaCakes118
-
Size
502KB
-
MD5
136c89acfb542963a9dc99a265c08ee4
-
SHA1
4364791f14242e2447be844a0fbf9c5b8bbed21b
-
SHA256
422931202dfa4214ad564a05b02b589ab3caeaa343352d4d99c03926918bcd12
-
SHA512
16ceff38dfb2fe45f03f44000e97f2eafecf18df1ccdd15974e867cffad8ae58e0cab82e05525b73af76b1d1117f7a4ff9882e0d316b08b20759ebe2c6247405
-
SSDEEP
6144:2bS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9nHP:2QtqB5urTIoYWBQk1E+VF9mOx9v
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-