General
-
Target
6be6af5aff7b5caa290a1a180a679277_JaffaCakes118
-
Size
1.3MB
-
Sample
240724-sjbtksvgng
-
MD5
6be6af5aff7b5caa290a1a180a679277
-
SHA1
09e97d9ee3ae05ed601a7d7a204d55e5f51d4531
-
SHA256
2456a7bb71cc0d7ce6dbd5791c313ea0a51ac8a491ac5d9b5ecd2b532a23f660
-
SHA512
d978117bfc8823215e23f87aa6e4f7b055598a65762a796fe209cb61ab3773ef87e5374284514dd6b7030752405e36248168a2b5aaa9e09193183bbaeb0264b2
-
SSDEEP
24576:1YUnFWo3oeT3JPbAmjuBVi55adQAftWhc+J:1dnFp3oEZdj15DAfYhc+
Static task
static1
Behavioral task
behavioral1
Sample
6be6af5aff7b5caa290a1a180a679277_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6be6af5aff7b5caa290a1a180a679277_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
6be6af5aff7b5caa290a1a180a679277_JaffaCakes118
-
Size
1.3MB
-
MD5
6be6af5aff7b5caa290a1a180a679277
-
SHA1
09e97d9ee3ae05ed601a7d7a204d55e5f51d4531
-
SHA256
2456a7bb71cc0d7ce6dbd5791c313ea0a51ac8a491ac5d9b5ecd2b532a23f660
-
SHA512
d978117bfc8823215e23f87aa6e4f7b055598a65762a796fe209cb61ab3773ef87e5374284514dd6b7030752405e36248168a2b5aaa9e09193183bbaeb0264b2
-
SSDEEP
24576:1YUnFWo3oeT3JPbAmjuBVi55adQAftWhc+J:1dnFp3oEZdj15DAfYhc+
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-