General
-
Target
30e9206ec9838aac54167888768f4911_JaffaCakes118
-
Size
819KB
-
Sample
240510-y9fhcabb92
-
MD5
30e9206ec9838aac54167888768f4911
-
SHA1
5124426ce06d24545b6c2675d002dd81065fdcdc
-
SHA256
aaf19aea750aad14cca5ccf1e3b9fd8eccc0d5065b73780ffdb9889f47246eb6
-
SHA512
3af1ef2bdd98bfb2347787dbd75edfbae6437204573936aefd20887f9944d39e9fcad658b5a772a358c2d3d7855f8dc3658cf3292167ac33ec3a66bd66518370
-
SSDEEP
24576:UiDCC7a4syWe2U/UKJlKlxtB0QdasKtfKnrzi0:U/f4sy12U/UKTKbbvK0rz1
Static task
static1
Behavioral task
behavioral1
Sample
30e9206ec9838aac54167888768f4911_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
30e9206ec9838aac54167888768f4911_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
myrecords1248@
Targets
-
-
Target
30e9206ec9838aac54167888768f4911_JaffaCakes118
-
Size
819KB
-
MD5
30e9206ec9838aac54167888768f4911
-
SHA1
5124426ce06d24545b6c2675d002dd81065fdcdc
-
SHA256
aaf19aea750aad14cca5ccf1e3b9fd8eccc0d5065b73780ffdb9889f47246eb6
-
SHA512
3af1ef2bdd98bfb2347787dbd75edfbae6437204573936aefd20887f9944d39e9fcad658b5a772a358c2d3d7855f8dc3658cf3292167ac33ec3a66bd66518370
-
SSDEEP
24576:UiDCC7a4syWe2U/UKJlKlxtB0QdasKtfKnrzi0:U/f4sy12U/UKTKbbvK0rz1
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-