General
-
Target
4d7c6a31befbe5d1f132c329b2f6f56a_JaffaCakes118
-
Size
1.0MB
-
Sample
240516-26t34sde2z
-
MD5
4d7c6a31befbe5d1f132c329b2f6f56a
-
SHA1
78e2d1fb9d579af7937adea39dfe9aa639ab56ba
-
SHA256
cc87387f9d80a394d37b129af4be7af6b93dfd585f3a78d3decffc2f94c5689a
-
SHA512
62e8de438d79d314891bd67244c6b10c33737806614ab2f0ffd5675438e6b72b9c549aff03dda255fde2cb0fc6175d326702fb2def8507cfeeb695253d59ec20
-
SSDEEP
24576:VQtqBorTlYWBhE+V3mO9yDLss2yed2cw9Zifq1JB5/mOh:mtqFWM4mpDN2USfGF
Static task
static1
Behavioral task
behavioral1
Sample
4d7c6a31befbe5d1f132c329b2f6f56a_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4d7c6a31befbe5d1f132c329b2f6f56a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
THISISWHATIdo20@@
Targets
-
-
Target
4d7c6a31befbe5d1f132c329b2f6f56a_JaffaCakes118
-
Size
1.0MB
-
MD5
4d7c6a31befbe5d1f132c329b2f6f56a
-
SHA1
78e2d1fb9d579af7937adea39dfe9aa639ab56ba
-
SHA256
cc87387f9d80a394d37b129af4be7af6b93dfd585f3a78d3decffc2f94c5689a
-
SHA512
62e8de438d79d314891bd67244c6b10c33737806614ab2f0ffd5675438e6b72b9c549aff03dda255fde2cb0fc6175d326702fb2def8507cfeeb695253d59ec20
-
SSDEEP
24576:VQtqBorTlYWBhE+V3mO9yDLss2yed2cw9Zifq1JB5/mOh:mtqFWM4mpDN2USfGF
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-