General
-
Target
78beed59bdbe8e675f2ca67f22dd92be_JaffaCakes118
-
Size
331KB
-
Sample
240727-tpf6xsxdnj
-
MD5
78beed59bdbe8e675f2ca67f22dd92be
-
SHA1
c6ddfea4e4163ca722f96a75c9070e18b404755d
-
SHA256
cab9baeed0b5b271cf9de3361483d662e52c75dd6a73544701980f29210dc49e
-
SHA512
e35f37f9b6d7068fbd68605e177ba313441e0b594347e21e65c2bbb60b46408e4d60bc01d22086b7d90fee69f7d596c88f7608f1c2a9d1fa4a924ccd26dd8c54
-
SSDEEP
6144:b11zsVVxiyNnpxz1FEQOVA9/f1uuOyMGGDfqztNY/rvX0H+KDfQ+44Ym2siyUe:x1zsVVxiqFEs9/f1ulGGDqztWu+2fQFW
Static task
static1
Behavioral task
behavioral1
Sample
78beed59bdbe8e675f2ca67f22dd92be_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
78beed59bdbe8e675f2ca67f22dd92be_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.maccinox.com - Port:
587 - Username:
[email protected] - Password:
peru2016
Targets
-
-
Target
78beed59bdbe8e675f2ca67f22dd92be_JaffaCakes118
-
Size
331KB
-
MD5
78beed59bdbe8e675f2ca67f22dd92be
-
SHA1
c6ddfea4e4163ca722f96a75c9070e18b404755d
-
SHA256
cab9baeed0b5b271cf9de3361483d662e52c75dd6a73544701980f29210dc49e
-
SHA512
e35f37f9b6d7068fbd68605e177ba313441e0b594347e21e65c2bbb60b46408e4d60bc01d22086b7d90fee69f7d596c88f7608f1c2a9d1fa4a924ccd26dd8c54
-
SSDEEP
6144:b11zsVVxiyNnpxz1FEQOVA9/f1uuOyMGGDfqztNY/rvX0H+KDfQ+44Ym2siyUe:x1zsVVxiqFEs9/f1ulGGDqztWu+2fQFW
-
404 Keylogger Main Executable
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-