General
-
Target
74dc5c2e1755a1d74dbfb6d0d53ea86c_JaffaCakes118
-
Size
465KB
-
Sample
240726-t55t8azdjp
-
MD5
74dc5c2e1755a1d74dbfb6d0d53ea86c
-
SHA1
962761689c4c07d34d8a08d8265769e2a03987c2
-
SHA256
81d9bf0b215b180b801f6f9122d38823a951f32aa7224ee63cbb25daf374d637
-
SHA512
8267d2d4499be5395b419bba53b7a19e5f214afd06cecf4a3709391f6afa3facf9b08c6c2c954609211c998895e04e1c87b62088a0041500d6c7a6daebf4b021
-
SSDEEP
6144:mWtTVZOSORB8kbipWBymdsAqHrchnDqvjlxQNdJBaStPROtkMd4PJ9tLZKRCnpTT:mWJeShkbY+UCmYZaStZOtFde7zK0nhT
Static task
static1
Behavioral task
behavioral1
Sample
Urgent Purchase Order.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Urgent Purchase Order.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1171994922:AAHrYAv7JIpM5hzPMScAJJOdE7TBb00NwJY/sendMessage?chat_id=1194949947
Targets
-
-
Target
Urgent Purchase Order.exe
-
Size
1.0MB
-
MD5
dafa52752458a225e50c37fe83869ee8
-
SHA1
ff4ee0eee3d88d484b7eb544071c2b782a76c1fd
-
SHA256
78c7a8275481c0695385f98d7826643a2132be000bdac4bb03c396c9f21c9833
-
SHA512
2bb1322a7a237d9f78c7893a09de08977ded4596946fd0e1c0c0069aba93072563ab90b732e4274090aa4b36eb42bc56c26ea1c41198382c761b8563b305957c
-
SSDEEP
12288:FhmXpjqj6jRPLjRPqjBjjyjBjBjBjBjLj8QJkPv+wYLaStPgt1senlKdBrVa5Th:bmo2wYLltPgtdlArVa5
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-