General
-
Target
668a025022e6c8fe47aa0c5e8030e6e0_JaffaCakes118
-
Size
200KB
-
Sample
240723-hk54pstclq
-
MD5
668a025022e6c8fe47aa0c5e8030e6e0
-
SHA1
04c7630a794b771a9ef1d980b0b2b66998bdc32b
-
SHA256
a4403195b981f290922312ff5f0464f5fc9719b12dfd38da9639b5cf31ac9846
-
SHA512
183883d70550a9c333fbb68ddd93c6e7b060978144e693812282da25db6d2d45fad30e05738dbe3e3c96f9565039787aed5ae4fd845afbfea2fa62a5d1e63422
-
SSDEEP
6144:KSoKfASZZwg+wLoHZdgleUU7v8yav8d45rnhSG:KAASUmLnkJa0d4r
Static task
static1
Behavioral task
behavioral1
Sample
668a025022e6c8fe47aa0c5e8030e6e0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
668a025022e6c8fe47aa0c5e8030e6e0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
Protocol: smtp- Host:
Smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
killllllll
Targets
-
-
Target
668a025022e6c8fe47aa0c5e8030e6e0_JaffaCakes118
-
Size
200KB
-
MD5
668a025022e6c8fe47aa0c5e8030e6e0
-
SHA1
04c7630a794b771a9ef1d980b0b2b66998bdc32b
-
SHA256
a4403195b981f290922312ff5f0464f5fc9719b12dfd38da9639b5cf31ac9846
-
SHA512
183883d70550a9c333fbb68ddd93c6e7b060978144e693812282da25db6d2d45fad30e05738dbe3e3c96f9565039787aed5ae4fd845afbfea2fa62a5d1e63422
-
SSDEEP
6144:KSoKfASZZwg+wLoHZdgleUU7v8yav8d45rnhSG:KAASUmLnkJa0d4r
-
Drops file in Drivers directory
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-