General
-
Target
d62183bbe9fb12ff2b3e28d47d36b41a_JaffaCakes118
-
Size
1.7MB
-
Sample
240909-mj23wawbkf
-
MD5
d62183bbe9fb12ff2b3e28d47d36b41a
-
SHA1
0e703cf606d2753edd5400098bcf318e63fdba64
-
SHA256
32aa1ec796bb172a90e04779079658b95a385849382d8b98fa0ea8fccdd992bb
-
SHA512
c009a1c8c35492537e1f19c1c34b71f0dd77d00f454d752fc94bda5bdf9afd4be07b01e0a85dd0cd6436c093a97eca7b5b05298c5a48ab12dc79b5111cd93142
-
SSDEEP
12288:vX2map3Mj6jRPLjRPqjBjjyjBjBjBjBjLjbJJYpekFFFEOmW2UyJ21aN0F3h2A6W:vmvzkFFFHRjx/l5D
Static task
static1
Behavioral task
behavioral1
Sample
McDERMOTT STANDARD TERMS AND CONDITIONS(Inclusive of Appendix Kakinada - R01862322.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
McDERMOTT STANDARD TERMS AND CONDITIONS(Inclusive of Appendix Kakinada - R01862322.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://bitrix370.timeweb.ru/ - Port:
21 - Username:
cn94754 - Password:
c2eitfpidhgS
Targets
-
-
Target
McDERMOTT STANDARD TERMS AND CONDITIONS(Inclusive of Appendix Kakinada - R01862322.exe
-
Size
1.1MB
-
MD5
f0f1583895386c2bf77a4fdee48fc4cf
-
SHA1
df02abba060791e255e9129a7819d6a3f332bd6f
-
SHA256
9ee1bd8d321c0f2b59c8d9005f174cfdee3476d00f5fa9005655d0ca6bb22afd
-
SHA512
26534e4d176e4b107b53df817e763b53be2c74d73ab67572a72ae9f6c6421cec601b371aad5fa238d3837a2cea3d5b85b5529c0521dd559ff651a8b6897c5143
-
SSDEEP
12288:nX2map3Mj6jRPLjRPqjBjjyjBjBjBjBjLjbJJYpekFFFEOmW2UyJ21aN0F3h2A6W:nmvzkFFFHRjx/l5D
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-