General
-
Target
73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118
-
Size
494KB
-
Sample
240726-mt8neasgrj
-
MD5
73b8f1ec16231a14550fc51007ad07d3
-
SHA1
63f959b1df1e38137b14f5f14cb216b8c96dbd84
-
SHA256
5389a958986f6ceccaa9e44006852becbccabfb07f126d69e6b031227fb0b487
-
SHA512
b807774fcd2031715a1249b06138afe88ccc032857fecc0bea259e3be34e2e29a785e6c4ae314e7262872ca1309cd6bdf252cb3bf61efea67ab1ba08c500962b
-
SSDEEP
12288:tozjuOV98Gvx2jn5CEyUFqSP5NDUGvbbm:tgjV98GvUj5C8F35N5jbm
Static task
static1
Behavioral task
behavioral1
Sample
73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
oski
no1geekfun.com/surce/a/
Targets
-
-
Target
73b8f1ec16231a14550fc51007ad07d3_JaffaCakes118
-
Size
494KB
-
MD5
73b8f1ec16231a14550fc51007ad07d3
-
SHA1
63f959b1df1e38137b14f5f14cb216b8c96dbd84
-
SHA256
5389a958986f6ceccaa9e44006852becbccabfb07f126d69e6b031227fb0b487
-
SHA512
b807774fcd2031715a1249b06138afe88ccc032857fecc0bea259e3be34e2e29a785e6c4ae314e7262872ca1309cd6bdf252cb3bf61efea67ab1ba08c500962b
-
SSDEEP
12288:tozjuOV98Gvx2jn5CEyUFqSP5NDUGvbbm:tgjV98GvUj5C8F35N5jbm
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-