General
-
Target
d0ed490284433d796f977488b9843601_JaffaCakes118
-
Size
525KB
-
Sample
240907-ddyc3a1fjm
-
MD5
d0ed490284433d796f977488b9843601
-
SHA1
1bb180e020c0e7cac9b94e22a8a1703e232f954d
-
SHA256
3bdaa9e0d66e51b9c52aa8747980eed96f353b57b165d2ff5f3c7b8d529220ad
-
SHA512
d8e590bfb7d421cbc81c69a1cd59b4c73c4935a1b2abc56f3bbb4f18c7bfd092db9a523400dd228c09c6f692a40cd875b4929a4b6aee2d7d7a3d49429fec6187
-
SSDEEP
12288:zh6yZsNWgGHDo1THRQjtq0C2gYVxGrXL0jdjSa6pDMyjrE/8GbssOusqg:zhqGH6lQjtIZYEwhOagMcmJXkZ
Static task
static1
Behavioral task
behavioral1
Sample
PO BCA 210084.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO BCA 210084.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1644755040:AAGRTnph6BdO8-t1bJaOyVu9aeuJErmisqs/sendMessage?chat_id=1637651323
Targets
-
-
Target
PO BCA 210084.exe
-
Size
582KB
-
MD5
51bf91997f8dd9a6cb1abd28e7ad8e54
-
SHA1
4f43da855eef5b0b0011bd0de58d0621d6c510e0
-
SHA256
ea52bbd42da9e0a38915bf663dee48a58add23f62617f0178ea4906218936fa6
-
SHA512
05db9028812291014df4f1cda452185c62f77ef907329ad219d2610673d4882231cac0557ec0b102becf88d2c9d93066ade4d1b313d32f4637c0b2e521076751
-
SSDEEP
12288:91DDEt9utEjh0lcK4D6gjLrKZMONyftqvTB0Q:PK9uyjh+4D6gHrKHNyftql0Q
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-