General
-
Target
8e3387a21df351773d0baa5d5b8e81f3_JaffaCakes118
-
Size
444KB
-
Sample
240812-le7l5avdrj
-
MD5
8e3387a21df351773d0baa5d5b8e81f3
-
SHA1
ef1c5f4cd7827c913a7d8bcebd42a007b41548cb
-
SHA256
d29f4831af95f943503d8a62c07f76f69441a8b68ffe26ef3bc28b1d399840cf
-
SHA512
db43a666f9d47ff443307954af90cacd3ca010dc50ac8f35e81241b24d2ef21c273719e7da3585efba9287b4a4ebe5b96c9564525da37269c44ee051fb4a3bbb
-
SSDEEP
12288:4Nh/AV3vGLpaOV9HpiBM2EM7TmD9SRJVeBtPBOq+yNU:YStmpasHoVmDuVeB/OiU
Behavioral task
behavioral1
Sample
8e3387a21df351773d0baa5d5b8e81f3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8e3387a21df351773d0baa5d5b8e81f3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
kunci123
Targets
-
-
Target
8e3387a21df351773d0baa5d5b8e81f3_JaffaCakes118
-
Size
444KB
-
MD5
8e3387a21df351773d0baa5d5b8e81f3
-
SHA1
ef1c5f4cd7827c913a7d8bcebd42a007b41548cb
-
SHA256
d29f4831af95f943503d8a62c07f76f69441a8b68ffe26ef3bc28b1d399840cf
-
SHA512
db43a666f9d47ff443307954af90cacd3ca010dc50ac8f35e81241b24d2ef21c273719e7da3585efba9287b4a4ebe5b96c9564525da37269c44ee051fb4a3bbb
-
SSDEEP
12288:4Nh/AV3vGLpaOV9HpiBM2EM7TmD9SRJVeBtPBOq+yNU:YStmpasHoVmDuVeB/OiU
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-