General
-
Target
39adfb2b1182f59ba03df4dd265e3350_JaffaCakes118
-
Size
607KB
-
Sample
240512-mpv7hsef58
-
MD5
39adfb2b1182f59ba03df4dd265e3350
-
SHA1
d96633cc50f6466457707c3e2a3715b233d3a429
-
SHA256
3ef226b12ec5f7a382c884432ae146f8324b6c938383aa14f3f73407ba16d031
-
SHA512
0e722e476bacc44ab754f3bd4b39b828863615a1913bf1e133284923e39785fb7523a0a31d604fa20ad091eaae81f0c6e0c1fbaa45b0f72d8b7743d1c659afe2
-
SSDEEP
12288:5xK0O5VBPAt/GhPKp8AjCWiGJWu5b79Om1ZZX5wlYcSksCsi:X45VBPAEPKp8AjnNJd/9OKZTZIsi
Static task
static1
Behavioral task
behavioral1
Sample
39adfb2b1182f59ba03df4dd265e3350_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
39adfb2b1182f59ba03df4dd265e3350_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
Lilhero56
Targets
-
-
Target
39adfb2b1182f59ba03df4dd265e3350_JaffaCakes118
-
Size
607KB
-
MD5
39adfb2b1182f59ba03df4dd265e3350
-
SHA1
d96633cc50f6466457707c3e2a3715b233d3a429
-
SHA256
3ef226b12ec5f7a382c884432ae146f8324b6c938383aa14f3f73407ba16d031
-
SHA512
0e722e476bacc44ab754f3bd4b39b828863615a1913bf1e133284923e39785fb7523a0a31d604fa20ad091eaae81f0c6e0c1fbaa45b0f72d8b7743d1c659afe2
-
SSDEEP
12288:5xK0O5VBPAt/GhPKp8AjCWiGJWu5b79Om1ZZX5wlYcSksCsi:X45VBPAEPKp8AjnNJd/9OKZTZIsi
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-