General
-
Target
b1fde53efb77c5feefe3aec21a517997_JaffaCakes118
-
Size
747KB
-
Sample
240821-ecdgyaycrg
-
MD5
b1fde53efb77c5feefe3aec21a517997
-
SHA1
2ed24d838e52709347928299a429b82ac98dadde
-
SHA256
bbe8e9d853a8605dfc5eb7054b28c05fdece4e8378b59ec70a469d31145c6af5
-
SHA512
84cbb42ed4aacbc5a674e5c1ad3dbf59fb1c10e70c7904d96e22428ae1bc7df256aa6a2331add625f2c9680506a0786d075711e1e4c8739831000595af31a5ef
-
SSDEEP
12288:QRi8r7Yz4td/zbYPqdGnTSolJYlNj0EC9iPF+7dJMitxcV:QRi8rM8dfYPqdGnTn/4TiCF+7bMivcV
Static task
static1
Behavioral task
behavioral1
Sample
b1fde53efb77c5feefe3aec21a517997_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b1fde53efb77c5feefe3aec21a517997_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: ftp- Host:
killrecycler.do.am - Port:
21 - Username:
8killrecycler - Password:
43uyu_54y
Targets
-
-
Target
b1fde53efb77c5feefe3aec21a517997_JaffaCakes118
-
Size
747KB
-
MD5
b1fde53efb77c5feefe3aec21a517997
-
SHA1
2ed24d838e52709347928299a429b82ac98dadde
-
SHA256
bbe8e9d853a8605dfc5eb7054b28c05fdece4e8378b59ec70a469d31145c6af5
-
SHA512
84cbb42ed4aacbc5a674e5c1ad3dbf59fb1c10e70c7904d96e22428ae1bc7df256aa6a2331add625f2c9680506a0786d075711e1e4c8739831000595af31a5ef
-
SSDEEP
12288:QRi8r7Yz4td/zbYPqdGnTSolJYlNj0EC9iPF+7dJMitxcV:QRi8rM8dfYPqdGnTn/4TiCF+7bMivcV
Score10/10-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-