General

  • Target

    dfe048e455b82aa2fd20d375a3b88f43_JaffaCakes118

  • Size

    125KB

  • MD5

    dfe048e455b82aa2fd20d375a3b88f43

  • SHA1

    6927744dc02e34ec3683e2f99338009856503ef7

  • SHA256

    9074e6a70f25734f30fcf239025790c107eb60c28dadc4943cc9b5dc05610b6b

  • SHA512

    31bdadb1b1b9a09a3e57acf225d1ef5b50b4e0611dde07b1b7dc08ea8137dc3a3453d823d1ef695d4202f2c09e418baf8eab287fd8c713336a98789d6ef2cec2

  • SSDEEP

    3072:Qd/vyWmJe45x9ewdU0OcxDQdg38H2LI+7xkY:QXpk9Q0PQysHlsJ

Score
9/10

Malware Config

Signatures

  • Detected Nirsoft tools 1 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • Unsigned PE 5 IoCs

    Checks for missing Authenticode signature.

  • NSIS installer 4 IoCs

Files

  • dfe048e455b82aa2fd20d375a3b88f43_JaffaCakes118
    .exe windows:4 windows x86 arch:x86

    099c0646ea7282d232219f8807883be0


    Headers

    Imports

    Sections

  • $PLUGINSDIR/InstallOptions.dll
    .dll windows:4 windows x86 arch:x86

    b1cd0d78f652ce5fc63f0879371af012


    Headers

    Imports

    Exports

    Sections

  • $PLUGINSDIR/StartMenu.dll
    .dll windows:4 windows x86 arch:x86

    7868cd55f358bfb360f9eb8ce1512ca0


    Headers

    Imports

    Exports

    Sections

  • $PLUGINSDIR/ioSpecial.ini
  • $PLUGINSDIR/modern-wizard.bmp
  • mailpv.chm
    .chm
  • mailpv.exe
    .exe windows:4 windows x86 arch:x86

    0b809905358c0eaa9b7750661bba40ef


    Headers

    Imports

    Sections

  • readme.txt
  • uninst.exe
    .exe windows:4 windows x86 arch:x86

    099c0646ea7282d232219f8807883be0


    Headers

    Imports

    Sections