General
-
Target
c5f05de51de93cda05d218a60dd34c4d_JaffaCakes118
-
Size
276KB
-
Sample
240827-3ld2tsxbjd
-
MD5
c5f05de51de93cda05d218a60dd34c4d
-
SHA1
ff21a34f17713d06c8d786043f8c01ff1a3e5419
-
SHA256
37f75faf90e40a3a976b7f9282b940ae2ca00329b52b1272679c6a4ad41a6270
-
SHA512
a2830384ce6634b20baa0ccf97507d57c5a70072630363d844af0b5ecc377d11429e892a2726569cb64ef7127bed144da404cbfe0242c084f70ec619b450967f
-
SSDEEP
6144:OCI5O1r7KU59Gc5r/fx1tpATl3DtlqtusQVjsAzpHW3cf6TucjjBbuM:O/A9L5Dx1wTtHfnpHtSTugBiM
Static task
static1
Behavioral task
behavioral1
Sample
DHl Delivery reciept.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
DHl Delivery reciept.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.sapgroup.com.pk - Port:
587 - Username:
[email protected] - Password:
moin@26919
Targets
-
-
Target
DHl Delivery reciept.exe
-
Size
624KB
-
MD5
2cfdae4ee4082225277048a7735c1561
-
SHA1
da23e01a6e02dddfcd7a52b3822c28c5b16aafc2
-
SHA256
8243c8a72e7a2021b4d956f5dafc19ded0162e9eb99f158f8da83660ea9368b5
-
SHA512
764946c9a353ab7b4a71376efbfe143deaedfb753b6cf98489761b6fab442a79d07ef9b2e030f93f9bd9a3f7be7a65695e61f015da093dccfed8278be87df14a
-
SSDEEP
12288:9+p7p8KESESHe4/gD6WDSqWl/LDGTGM5irKnPkVB:UtRES4DBSq2KG2bPkVB
-
404 Keylogger Main Executable
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-