General

  • Target

    7ce831acc2ab2e54036cb5a06da5fb48_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240528-pc8cesdd82

  • MD5

    7ce831acc2ab2e54036cb5a06da5fb48

  • SHA1

    469dd7ed3b974e3d4f4708849bbe002c660ecb4d

  • SHA256

    10d0fe912ea42a52eab5fcccb685081fd941b43cfca0066d7f9ed53352f8c40b

  • SHA512

    918dee860c54a218699294c395fe36fb058b37ead5a86ca5802d1bb2f2800d633c9e9d47315fcf62f98bf88f95c4fa70c724e856ae2f88550967c95a1a2c15ec

  • SSDEEP

    24576:1u6J33O0c+JY5UZ+XC0kGso6Fa3hXJRn2uHfZL62szBg5qWY:Xu0c++OCvkGs9Fa3hXH2CZL6TFgnY

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    jzAiWWw6

Targets

    • Target

      7ce831acc2ab2e54036cb5a06da5fb48_JaffaCakes118

    • Size

      1.2MB

    • MD5

      7ce831acc2ab2e54036cb5a06da5fb48

    • SHA1

      469dd7ed3b974e3d4f4708849bbe002c660ecb4d

    • SHA256

      10d0fe912ea42a52eab5fcccb685081fd941b43cfca0066d7f9ed53352f8c40b

    • SHA512

      918dee860c54a218699294c395fe36fb058b37ead5a86ca5802d1bb2f2800d633c9e9d47315fcf62f98bf88f95c4fa70c724e856ae2f88550967c95a1a2c15ec

    • SSDEEP

      24576:1u6J33O0c+JY5UZ+XC0kGso6Fa3hXJRn2uHfZL62szBg5qWY:Xu0c++OCvkGs9Fa3hXH2CZL6TFgnY

    • 404 Keylogger

      Information stealer and keylogger first seen in 2019.

    • 404 Keylogger Main Executable

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks