General
-
Target
721fc9603ce2f698832856691759e8d1_JaffaCakes118
-
Size
1.9MB
-
Sample
240730-q24k7s1hpm
-
MD5
721fc9603ce2f698832856691759e8d1
-
SHA1
ab1fefaa0863fc787b4cf8cbe94be559d20586c3
-
SHA256
726c91cce56e7f2984e3df904e902a892699f18061cc6934d14b7998d04e53d2
-
SHA512
03cc0753ea33eb241dcff3bf11833f9a4972be59595f9bdbb77bc3afb05fbdb9b394c9b21a632140f8d4a8e4c38b884ba56750661ecc15e17cfdad00b43016f1
-
SSDEEP
24576:bAHnh+eWsN3skA4RV1Hom2KXMmHavFmN0CldmeK15O9EE8HSpSyD5:2h+ZkldoPK8YabC
Static task
static1
Behavioral task
behavioral1
Sample
721fc9603ce2f698832856691759e8d1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
721fc9603ce2f698832856691759e8d1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
zxcvbn@123
Targets
-
-
Target
721fc9603ce2f698832856691759e8d1_JaffaCakes118
-
Size
1.9MB
-
MD5
721fc9603ce2f698832856691759e8d1
-
SHA1
ab1fefaa0863fc787b4cf8cbe94be559d20586c3
-
SHA256
726c91cce56e7f2984e3df904e902a892699f18061cc6934d14b7998d04e53d2
-
SHA512
03cc0753ea33eb241dcff3bf11833f9a4972be59595f9bdbb77bc3afb05fbdb9b394c9b21a632140f8d4a8e4c38b884ba56750661ecc15e17cfdad00b43016f1
-
SSDEEP
24576:bAHnh+eWsN3skA4RV1Hom2KXMmHavFmN0CldmeK15O9EE8HSpSyD5:2h+ZkldoPK8YabC
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-