General
-
Target
9502a9bb8817b95a0869d9d5993fa6bc_JaffaCakes118
-
Size
663KB
-
Sample
240604-qqa5hshe67
-
MD5
9502a9bb8817b95a0869d9d5993fa6bc
-
SHA1
38b967398a8fbcbbe3ec3e543847ba6888b3b096
-
SHA256
ed57cba9387fa1f503b7c5b4bd07f4090ba98a3de174cfdf09ef8446d00bd670
-
SHA512
5b9ea6937dc49291d06498e0301e072c1f0670ef34506d5c8804ec76216f7cd11a0b0729269652034e3af3af74e01ef89ac021fd48f98ea6fd4767276ca7c313
-
SSDEEP
12288:UP+zKn7bJwEPhNEJahx6Epr4fPKdOWTzBhiatAe6UPEDTrkQaWWp:UGzKxwEDdQ6r4fSpiaAUfQWp
Static task
static1
Behavioral task
behavioral1
Sample
Statement.Of.Account.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
Statement.Of.Account.exe
-
Size
730KB
-
MD5
d875b18ba8697ac9f3f6a5733ae916fa
-
SHA1
1e2704f3b999e57e84c2b5e9fb27a47d4fa3f356
-
SHA256
ce80af98fda09bf24006e478aca3f2bdc6e496a293223116b0da19d7aa2073cd
-
SHA512
b493af28acc377e63c6b929b167818b5234efadf29e420cb71637621afd729dcd320051281684e5783a10e41a4fe15ccea8a085ec1c140b5fc8124f12a5f70ad
-
SSDEEP
12288:cMput4EcmZHAFaxmVmie9bngPooRy3i0zPPQEHjRYS11CQmWHDK32UD0JK79Jiek:cMpk4EcmZHAFaxmVmie9bngPZmwEHjq7
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-