General
-
Target
a9a5156e6c02ef71536fa26d7a19883d_JaffaCakes118
-
Size
413KB
-
Sample
240819-fe8xasycqn
-
MD5
a9a5156e6c02ef71536fa26d7a19883d
-
SHA1
b96331803fb42f5732d1c3dd5961f2dd24960334
-
SHA256
4f8719454a5d66f66217862dfa00f945e23fa900ebbb2a15020e95d1456d9e8f
-
SHA512
18bb6b8d2edd878eab033a6c1d5de730d9ece114474520996bbcae5fcd9cfee6834d753d288c58bf030ff544d70b42260489f9aa3d172c5c7798bafbd6cf0b32
-
SSDEEP
6144:hHxV+CnbBGYyu3b31ncqvR3hTfwzka3ztI0jV2fo+8RoG7tswzLrQqGm+69jU:bkCnw63b3BhTfKztIffrG7qcvDhjU
Static task
static1
Behavioral task
behavioral1
Sample
orden010221.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
orden010221.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.maccinox.com - Port:
587 - Username:
[email protected] - Password:
peru2016
Targets
-
-
Target
orden010221.exe
-
Size
482KB
-
MD5
d35463b27bc9d531685c21d6b25bcb23
-
SHA1
44222b7cc9de3847bef8c6b5f5639a824edbaf7b
-
SHA256
2348ad3a4247f29ff40fbbdcbf559dedf6396e2fda0a1a9693d48fa0f0bc14b7
-
SHA512
de042bf76e89376c444b58f1ac055ca60306d1526c9cbd5de17334b8b6923098d67002b8579565347f7c1790da25b8ac0a32ba05647be84abe414c47f860c365
-
SSDEEP
12288:gb09CXxbZi970MGS33h3fIzRIBfzG7qCv7d6:gUIbZnSnhHfzGuCDI
-
404 Keylogger Main Executable
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
CustAttr .NET packer
Detects CustAttr .NET packer in memory.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-