General
-
Target
e9cce90ea69fdf871b927262ec4afc5a_JaffaCakes118
-
Size
2.6MB
-
Sample
240918-xwj3yayerl
-
MD5
e9cce90ea69fdf871b927262ec4afc5a
-
SHA1
2ca8ae610ca6521559cef3492b9de700c2ca86b5
-
SHA256
c2ccef24c19ee0890b6125f7de60b1e048dfa7da47766d1767e698e63ac08d83
-
SHA512
7099d2fcc52fc37b9f376e61556a06669d7904f38cfcd574de54ada0f7dcd98e93b8dd3466c101e1d329d3ab45f1a6985378d74cf332558c8fcd213753b8a54e
-
SSDEEP
49152:lGhVJmzCDq35LO3mIp07KtjgRk0oqRuwSCFVPB9ZhhqDF8xLt9QQfBcWqeR+jlVi:8jLW8O3pQ1a7
Static task
static1
Behavioral task
behavioral1
Sample
e9cce90ea69fdf871b927262ec4afc5a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e9cce90ea69fdf871b927262ec4afc5a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1409117409:AAEFt4YnGc3z_QpFHH3H-nEiZzlWw-2MC7Y/sendMessage?chat_id=1377979415
Targets
-
-
Target
e9cce90ea69fdf871b927262ec4afc5a_JaffaCakes118
-
Size
2.6MB
-
MD5
e9cce90ea69fdf871b927262ec4afc5a
-
SHA1
2ca8ae610ca6521559cef3492b9de700c2ca86b5
-
SHA256
c2ccef24c19ee0890b6125f7de60b1e048dfa7da47766d1767e698e63ac08d83
-
SHA512
7099d2fcc52fc37b9f376e61556a06669d7904f38cfcd574de54ada0f7dcd98e93b8dd3466c101e1d329d3ab45f1a6985378d74cf332558c8fcd213753b8a54e
-
SSDEEP
49152:lGhVJmzCDq35LO3mIp07KtjgRk0oqRuwSCFVPB9ZhhqDF8xLt9QQfBcWqeR+jlVi:8jLW8O3pQ1a7
-
Beds Protector Packer
Detects Beds Protector packer used to load .NET malware.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-