General
-
Target
cc08b5e81f33b7869098fbbf8f46940c_JaffaCakes118
-
Size
923KB
-
Sample
240831-b6579syenh
-
MD5
cc08b5e81f33b7869098fbbf8f46940c
-
SHA1
1216f0041f73500082517f28bda108145f52a290
-
SHA256
84932631ef1f83a60117e2854c056be17b8cfc32fb495e308dc128f2a7b698c1
-
SHA512
749f8cbab836ba960e1c171697079440311e23a0e340a171ae15f809a8934014859b513d3716d634602fdbaf71b5d41784212bd31333990c1baab3bfc60a1473
-
SSDEEP
24576:FmkMT0kFEibzaKagzcl0pI60kMi/BaBEIyhvQhtBNXNHGXa:gkMT0kFxzbcl03vMqBaBEVhvQ/rVaa
Static task
static1
Behavioral task
behavioral1
Sample
2016pdf.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2016pdf.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.1and1.it - Port:
587 - Username:
[email protected] - Password:
Wako2j22#
Targets
-
-
Target
2016pdf.exe
-
Size
965KB
-
MD5
e289bcf6d77230d7fdb4d8a0bf126723
-
SHA1
70880bcc5a8ac31df2dc6aa2e03f8f73965f7812
-
SHA256
98c08e97f88fd09e81a8dc3e3234f89ceed282048a4275c7a2f1b9bc116db41f
-
SHA512
a7883c1644d143c4d8a6384e7b9d0eeaf9e8ce51c76b3c35f2daf89c04944d77be99af095b31f5a1ba46c8bd271f89aa20d963d4d6a61176cb040e01288395eb
-
SSDEEP
24576:pQu+IperrOUj6k7ZqC30kKoreoQSQS4kHHDJ1VnmjSd/EG:pQyk7ZxlK5oAkDJ1ZYSds
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-