General
-
Target
5bd63568e12753b7d4c1c3132f60b6ed_JaffaCakes118
-
Size
987KB
-
Sample
240519-2h3qcaee4s
-
MD5
5bd63568e12753b7d4c1c3132f60b6ed
-
SHA1
c4dd12a2142102d979be73457f500d10ea7572cd
-
SHA256
8db60922ef95a644bfb0dced7bed12037c2045b842a2525b2b13713659a997b3
-
SHA512
82c3ab207dea015862f9163079cabfe69fcb27f58730d93372cf7704a3cddc0944b348a624e9b19ff5f9b7756f402aa8095d24df2800f62da04ba4467e6bdd5b
-
SSDEEP
24576:XQRRRRRRRRRRRRRRRRRRRRRtOperrOUj6k7ZqC30Qa/1T/lQ5m1zYHB3wMAx0ZDt:XQRRRRRRRRRRRRRRRRRRRRRtak7Zx7ae
Static task
static1
Behavioral task
behavioral1
Sample
5bd63568e12753b7d4c1c3132f60b6ed_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5bd63568e12753b7d4c1c3132f60b6ed_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
5bd63568e12753b7d4c1c3132f60b6ed_JaffaCakes118
-
Size
987KB
-
MD5
5bd63568e12753b7d4c1c3132f60b6ed
-
SHA1
c4dd12a2142102d979be73457f500d10ea7572cd
-
SHA256
8db60922ef95a644bfb0dced7bed12037c2045b842a2525b2b13713659a997b3
-
SHA512
82c3ab207dea015862f9163079cabfe69fcb27f58730d93372cf7704a3cddc0944b348a624e9b19ff5f9b7756f402aa8095d24df2800f62da04ba4467e6bdd5b
-
SSDEEP
24576:XQRRRRRRRRRRRRRRRRRRRRRtOperrOUj6k7ZqC30Qa/1T/lQ5m1zYHB3wMAx0ZDt:XQRRRRRRRRRRRRRRRRRRRRRtak7Zx7ae
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-