General
-
Target
dc83500f11eef58ddbb21c9dd2d17729_JaffaCakes118
-
Size
452KB
-
Sample
240912-svwm5a1fka
-
MD5
dc83500f11eef58ddbb21c9dd2d17729
-
SHA1
46b0de105332e090806d5e95f38ee0a33c10ad3b
-
SHA256
2160a2fba2efc22751b82cebb9d4ce21dfe35782cfb21bbf512687f413b80e65
-
SHA512
b1289ae61523b0e170a434361e727bf5e0e0043c4596214b4823e6c961ace6a61b796adcbd459cbdcddab3c7d9ff3236ad81a9d88f8a9ca31206a90fb1c127ad
-
SSDEEP
12288:RH06XwKIhiXX1oJMdqvEu6XFhCQxy1Hex/pKAQb9NsAm:9frX1oJwqvEujh2xiBm
Static task
static1
Behavioral task
behavioral1
Sample
dc83500f11eef58ddbb21c9dd2d17729_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc83500f11eef58ddbb21c9dd2d17729_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
jy2091qep.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
jy2091qep.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.potagrup.com - Port:
587 - Username:
[email protected] - Password:
Pgrup@2021
Targets
-
-
Target
dc83500f11eef58ddbb21c9dd2d17729_JaffaCakes118
-
Size
452KB
-
MD5
dc83500f11eef58ddbb21c9dd2d17729
-
SHA1
46b0de105332e090806d5e95f38ee0a33c10ad3b
-
SHA256
2160a2fba2efc22751b82cebb9d4ce21dfe35782cfb21bbf512687f413b80e65
-
SHA512
b1289ae61523b0e170a434361e727bf5e0e0043c4596214b4823e6c961ace6a61b796adcbd459cbdcddab3c7d9ff3236ad81a9d88f8a9ca31206a90fb1c127ad
-
SSDEEP
12288:RH06XwKIhiXX1oJMdqvEu6XFhCQxy1Hex/pKAQb9NsAm:9frX1oJwqvEujh2xiBm
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
fccff8cb7a1067e23fd2e2b63971a8e1
-
SHA1
30e2a9e137c1223a78a0f7b0bf96a1c361976d91
-
SHA256
6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
-
SHA512
f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c
-
SSDEEP
192:xPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4v:g7VpNo8gmOyRsVc4
Score3/10 -
-
-
Target
jy2091qep.dll
-
Size
18KB
-
MD5
a393df2af4708ff2592687ff4ee343b9
-
SHA1
19b5212fc5dbd673f7e4f78c52b6c0ea33121d85
-
SHA256
eea2ac27c7db126176b9cbf245328c9acb06665995f1212cc28792304ca3f6f5
-
SHA512
b960e1ad593a17d94cacec2ef4e30c1b17b69469e3f1a0b26d992dce1ef697078a466bd1bde5779373bae6ff5b35c39a13f818c03c4a3a3eacda051b44ea0491
-
SSDEEP
384:WkZm9ZV/dm0q96GA2P0ICNPBRJyCmyCtQV2djVh2:WkZaZVd/qSkQHDlV2djV
Score3/10 -