General
-
Target
7aa37911020ad41e9aba5578c8f33923_JaffaCakes118
-
Size
1.1MB
-
Sample
240527-1ln6pabb5t
-
MD5
7aa37911020ad41e9aba5578c8f33923
-
SHA1
e81d5b3fdd371a45ae86fd2b27d03f8e94992c9e
-
SHA256
8cbf41671be105849a83733514a591d0a9427611532904959c67879fd142fbcd
-
SHA512
34bcbd391e1eae4cbbbcb83a6320760eb509ad1d362156d82a22902fbf2f406646ebe0c37ab5536cf9c2ec4dd0e2c1e23445934e89fbe2098ec2f3007f4c4cdc
-
SSDEEP
24576:sjgEcqDl1o2+cvnavK1lDuwBJl7GPuVe9srR3/:OgEv1R8K1hPBGyOWRv
Static task
static1
Behavioral task
behavioral1
Sample
7aa37911020ad41e9aba5578c8f33923_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7aa37911020ad41e9aba5578c8f33923_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
7aa37911020ad41e9aba5578c8f33923_JaffaCakes118
-
Size
1.1MB
-
MD5
7aa37911020ad41e9aba5578c8f33923
-
SHA1
e81d5b3fdd371a45ae86fd2b27d03f8e94992c9e
-
SHA256
8cbf41671be105849a83733514a591d0a9427611532904959c67879fd142fbcd
-
SHA512
34bcbd391e1eae4cbbbcb83a6320760eb509ad1d362156d82a22902fbf2f406646ebe0c37ab5536cf9c2ec4dd0e2c1e23445934e89fbe2098ec2f3007f4c4cdc
-
SSDEEP
24576:sjgEcqDl1o2+cvnavK1lDuwBJl7GPuVe9srR3/:OgEv1R8K1hPBGyOWRv
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-