General
-
Target
217b447b0791d6cbcf06a227f34570b1_JaffaCakes118
-
Size
744KB
-
Sample
240507-ylw57afd68
-
MD5
217b447b0791d6cbcf06a227f34570b1
-
SHA1
f1835601eef626ff4b7069c15f7d8c34e64ff8f9
-
SHA256
4a1a81651fa84dd61c6968ba83d03fab3a8f0dc94e839a376bacc53be86ffe52
-
SHA512
b48c1b38b362c7ac3c9c3d13dae09cac6f02f28902eb158dd8996a2e001cf30e1afe3a4393fac7692f2635f92706c18094f8ac05d89992aac339df2705cf1b7c
-
SSDEEP
12288:/MboOwkyVGvuC8GlpkCaiF2lbFp5Ry68SzMuU9BtjorgqA7SQjDrAO1RUJJPNoq0:/goOwkyovL8GlpVar9u6nzMuUbigFZoq
Static task
static1
Behavioral task
behavioral1
Sample
RSL-2019.exe
Resource
win7-20240220-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
alibaba123
Targets
-
-
Target
RSL-2019.exe
-
Size
782KB
-
MD5
960ac9e115b8ee2adfe3460d7a9f0eed
-
SHA1
f845c68575e67d0a5112113c31fc8a46a1cb9d01
-
SHA256
fd4612dd41fcb1d4038385cde915ff6c3b3136ba4edee76bdf1224eb224914ad
-
SHA512
ad85679b972fc19afcef5177502c83824e0d62b19827ef00ac9285f2e645cb0178160caf7ddd8aecb94564783a4b1ff7758b66677bff6341ce78c69ee6a9eb34
-
SSDEEP
12288:CTCHhLQk3jEB0/iR+V2b5Y1bz9tPfFpb4m7LjeZx3TJu/Hv0J5tmCB77k:CTwv6R+G5e/95HbB7Lje3TgHv0JmCZQ
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-