General
-
Target
82ce2f8364d3dca44267a6b049b4a070_JaffaCakes118
-
Size
834KB
-
Sample
240802-dj676asdrq
-
MD5
82ce2f8364d3dca44267a6b049b4a070
-
SHA1
091df496943099bfe2f03c5a0d53789ed89f094e
-
SHA256
ae6ad2297366fb5194e553992732f0a5740de2c5fe4b7be56fd2e1a52cb915c4
-
SHA512
3ee34812e076f7b835ddc99fd79f5585a7cb6471e632a9ab17dc0d41c701565c75bb0ee96a13cb9e8e9b67a4c3e3dcb29066df0878b8c8de5e403102681cc9e4
-
SSDEEP
12288:Ygs1igEFKsIHLJ+lyMziSR9De65ASncRoLoXTerD7FJTO187Du0lvBbczjQgykMQ:BFKLriziS1NtoqrLTO8DdB+7M2ygp
Static task
static1
Behavioral task
behavioral1
Sample
82ce2f8364d3dca44267a6b049b4a070_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
82ce2f8364d3dca44267a6b049b4a070_JaffaCakes118.exe
Resource
win10v2004-20240730-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.maccinox.com - Port:
587 - Username:
[email protected] - Password:
peru2016
Targets
-
-
Target
82ce2f8364d3dca44267a6b049b4a070_JaffaCakes118
-
Size
834KB
-
MD5
82ce2f8364d3dca44267a6b049b4a070
-
SHA1
091df496943099bfe2f03c5a0d53789ed89f094e
-
SHA256
ae6ad2297366fb5194e553992732f0a5740de2c5fe4b7be56fd2e1a52cb915c4
-
SHA512
3ee34812e076f7b835ddc99fd79f5585a7cb6471e632a9ab17dc0d41c701565c75bb0ee96a13cb9e8e9b67a4c3e3dcb29066df0878b8c8de5e403102681cc9e4
-
SSDEEP
12288:Ygs1igEFKsIHLJ+lyMziSR9De65ASncRoLoXTerD7FJTO187Du0lvBbczjQgykMQ:BFKLriziS1NtoqrLTO8DdB+7M2ygp
-
404 Keylogger Main Executable
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-