General
-
Target
88841a1cd43a61ba35d58e701317b686_JaffaCakes118
-
Size
302KB
-
Sample
240811-b626lstcqb
-
MD5
88841a1cd43a61ba35d58e701317b686
-
SHA1
e3602ae179d4bbad211f08231eb262ec12a1ae4c
-
SHA256
e87b86817a7a63d7084319ed07a798c9b64ddf482d7ee59549d4aa3280f20a08
-
SHA512
b03dacc7aeac304c4797e3417882fb9038c284c3bffa4522025623189bc37c3685d3021261da5bc2fcb379d7271a1d156eea12b24b7f54b8e4745d83549075f6
-
SSDEEP
6144:kyhH52KBkr9/H1uuO2MSqzTq3tN0/rvX0r+KDfk+4PgnXpjesZ:kyhH5Jq9/H1uBSqvq3tes+2fkFPWXZ
Static task
static1
Behavioral task
behavioral1
Sample
aviso de transfer.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aviso de transfer.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.maccinox.com - Port:
587 - Username:
[email protected] - Password:
peru2016
Targets
-
-
Target
aviso de transfer.exe
-
Size
331KB
-
MD5
78beed59bdbe8e675f2ca67f22dd92be
-
SHA1
c6ddfea4e4163ca722f96a75c9070e18b404755d
-
SHA256
cab9baeed0b5b271cf9de3361483d662e52c75dd6a73544701980f29210dc49e
-
SHA512
e35f37f9b6d7068fbd68605e177ba313441e0b594347e21e65c2bbb60b46408e4d60bc01d22086b7d90fee69f7d596c88f7608f1c2a9d1fa4a924ccd26dd8c54
-
SSDEEP
6144:b11zsVVxiyNnpxz1FEQOVA9/f1uuOyMGGDfqztNY/rvX0H+KDfQ+44Ym2siyUe:x1zsVVxiqFEs9/f1ulGGDqztWu+2fQFW
-
404 Keylogger Main Executable
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-