General
-
Target
a11f0afb4803b65a79f0102767d4b3d1_JaffaCakes118
-
Size
1.4MB
-
Sample
240817-ej7pcswdng
-
MD5
a11f0afb4803b65a79f0102767d4b3d1
-
SHA1
8fd374959dcff21b8fb1a7e830a35bd0ddb5e229
-
SHA256
ce6e6ebddcbd695f81f01a71c942354ccb5f005e686968c1945d9c7bd6d2dd64
-
SHA512
4fedf1028b76f28711d4f58f0cd6162faea8346a64fb937d4ea712c978a712914445e60c254c5f33ca84dd9090221ef6ba10cd9eb571b6d7fbea31b8ed67cc59
-
SSDEEP
12288:sl4XsYCvxGbhXycaJ1JY5U2OgwXtr2R72pn+ixmeE2wT:x9CpGdy9J1m5Vo2R7Cn+i8/1
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents Original BL, Invoice & Packing List.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Shipping Documents Original BL, Invoice & Packing List.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://bitrix370.timeweb.ru/ - Port:
21 - Username:
cn94754 - Password:
c2eitfpidhgS
Targets
-
-
Target
Shipping Documents Original BL, Invoice & Packing List.exe
-
Size
827KB
-
MD5
f281e6f97227cfdcb2edca1037fb0efb
-
SHA1
745c3bd6b590aee05eb9af4bb6241df002796873
-
SHA256
67108fc6d911e90188c65b91728152289ba95b48ab037fecf68822c818c4c812
-
SHA512
e0e21957ffaf42e1f7d6192a77c1c60313b293860bfd8f82f54568d5249782e891ac8b2e3f4133f2e26d3c6433594b13086c68127f16d769fbc61245d209c2d8
-
SSDEEP
12288:Sl4XsYCvxGbhXycaJ1JY5U2OgwXtr2R72pn+ixmeE2wT:79CpGdy9J1m5Vo2R7Cn+i8/1
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1