General
-
Target
d937649959e9f1b398815ba499c2c751_JaffaCakes118
-
Size
699KB
-
Sample
240910-3mrpba1anq
-
MD5
d937649959e9f1b398815ba499c2c751
-
SHA1
269502c04944d6b9e442af35f9e923103e1e477f
-
SHA256
8c1ba03136ab60409d577c7b61fc4bf858468377ff92f438dad8dff45262b6ec
-
SHA512
10b3a80cd2ec3afb8ea45614c755758c9b31f9dcf3eebf39517616894407554994192ab4ce196cc69e1225afb07cee134a68f14bb6a42fc943e0a1727e2a57fe
-
SSDEEP
6144:JsOKSDMpra6UeOiolIJ6rHD/rj7uALWseM0l5yI0gLlfXRAV3lwoMGy:Mp1siols6rHD/rj7uAw15yl0Noy
Static task
static1
Behavioral task
behavioral1
Sample
d937649959e9f1b398815ba499c2c751_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d937649959e9f1b398815ba499c2c751_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.sydneylaptops.com.au - Port:
587 - Username:
[email protected] - Password:
Ijeomam288@
Targets
-
-
Target
d937649959e9f1b398815ba499c2c751_JaffaCakes118
-
Size
699KB
-
MD5
d937649959e9f1b398815ba499c2c751
-
SHA1
269502c04944d6b9e442af35f9e923103e1e477f
-
SHA256
8c1ba03136ab60409d577c7b61fc4bf858468377ff92f438dad8dff45262b6ec
-
SHA512
10b3a80cd2ec3afb8ea45614c755758c9b31f9dcf3eebf39517616894407554994192ab4ce196cc69e1225afb07cee134a68f14bb6a42fc943e0a1727e2a57fe
-
SSDEEP
6144:JsOKSDMpra6UeOiolIJ6rHD/rj7uALWseM0l5yI0gLlfXRAV3lwoMGy:Mp1siols6rHD/rj7uAw15yl0Noy
-
Beds Protector Packer
Detects Beds Protector packer used to load .NET malware.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-