General
-
Target
d702b465244361115b6974367ccf702d_JaffaCakes118
-
Size
1.1MB
-
Sample
240909-ytq9xaxdmr
-
MD5
d702b465244361115b6974367ccf702d
-
SHA1
7fc0bdc13c6dc3f9a6faeb11a2223b94f2c7fa6a
-
SHA256
9db30166127dd97862c8483553a059c0e29fa53b50ac17926b1eef55b63aa24f
-
SHA512
8e4794ba37886445037ed300d1d1154a3f5768472baf02d94c1795344e6db6bf52836f4ca452b27cc714bf688664084d6ffaa14ba2c2ca1aaeafbcc9e528f9a7
-
SSDEEP
24576:Sc+EINin0zh1YT3q+iSoSHYB15+CMdtnn0bLFbT7fL1SLaTUdKV:SRhon0zva3Wh1UL0bLpT7fuKV
Static task
static1
Behavioral task
behavioral1
Sample
Updated SOA#8203204927107#.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Updated SOA#8203204927107#.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.pekarnazorman.si - Port:
587 - Username:
[email protected] - Password:
dragica - Email To:
[email protected]
Targets
-
-
Target
Updated SOA#8203204927107#.exe
-
Size
2.7MB
-
MD5
6f8faaa0b38d96d6a22e77ef6bb92c5e
-
SHA1
5fb6a749371864c0a0a4c5be6faee65385126976
-
SHA256
89f1983ad923c2485a4b4e06b168a096546d35fd90e88d26485756a37fc4a829
-
SHA512
5c2207467d8b530f86c9d1140fe807d93ff5bbe536c2cb07ce125dc55a2409378dd7fbcbc6bddb0a09d6d0db51a727d075e1bd922b2f230489d20386c93aa241
-
SSDEEP
49152:soZ0ajbQzlq5O+l4QOnn8jeX+l8uvlhfNf5lWLPNyeL9+hw/USGy7Xk/51HwgG9d:xX0zlC6mt98S2mnwQ1a7r
-
Beds Protector Packer
Detects Beds Protector packer used to load .NET malware.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-