General
-
Target
47da4d3bf793afa1031e56f5b134386d_JaffaCakes118
-
Size
702KB
-
Sample
240515-y2zk9ahh9s
-
MD5
47da4d3bf793afa1031e56f5b134386d
-
SHA1
1414910b990f88f2c17d26c4754b101be524a45d
-
SHA256
c7f427fc88416af7ea99c1f0f469e4ff7c7f758b29daa78bdbab9ab83f1ce569
-
SHA512
1e3dbd03ecf735f29e05eae89ecce00788627aa3fbf9817ae91a6994c177355ba925f742808cc52a6cfa57fa6509b221d3365447c47832eb9240665966c3e803
-
SSDEEP
12288:bmB+N54kL2uW2m0e/h80S8+FUU2+dfp0XPZZsKk7OHA1XItXKi4gA:w+j4M2Cm0uQ2+B0f9csTXKrg
Static task
static1
Behavioral task
behavioral1
Sample
47da4d3bf793afa1031e56f5b134386d_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
47da4d3bf793afa1031e56f5b134386d_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
hawkeye_reborn
- fields
- name
Extracted
Protocol: smtp- Host:
smtp.zoho.com - Port:
587 - Username:
[email protected] - Password:
Rule@.#1
Targets
-
-
Target
47da4d3bf793afa1031e56f5b134386d_JaffaCakes118
-
Size
702KB
-
MD5
47da4d3bf793afa1031e56f5b134386d
-
SHA1
1414910b990f88f2c17d26c4754b101be524a45d
-
SHA256
c7f427fc88416af7ea99c1f0f469e4ff7c7f758b29daa78bdbab9ab83f1ce569
-
SHA512
1e3dbd03ecf735f29e05eae89ecce00788627aa3fbf9817ae91a6994c177355ba925f742808cc52a6cfa57fa6509b221d3365447c47832eb9240665966c3e803
-
SSDEEP
12288:bmB+N54kL2uW2m0e/h80S8+FUU2+dfp0XPZZsKk7OHA1XItXKi4gA:w+j4M2Cm0uQ2+B0f9csTXKrg
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-