General
-
Target
e9f2888c5fb4944f2f72e8bde6b59881_JaffaCakes118
-
Size
188KB
-
Sample
240918-zm5z6atbjn
-
MD5
e9f2888c5fb4944f2f72e8bde6b59881
-
SHA1
ad14dbb9c6dcb4d66d3e8e9959f82237b4658874
-
SHA256
3208ea6b8177e8e2abbba46516624677c0a19bc2760ec3ecb7ec6c05cccf631e
-
SHA512
2aae633c620878b3883cf5ae18d94482eb59ca531c025b22262f3110efe4a6f6a0913836995a57213af362901d46e469223cd2eb8f48453489359dce815182d0
-
SSDEEP
3072:lRMB80RZaVEVbq0OnPAXyC0FVPbU+n5noSH30TC:lOBLRZtGvnPAXn0jzJ5oSF
Static task
static1
Behavioral task
behavioral1
Sample
e9f2888c5fb4944f2f72e8bde6b59881_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9f2888c5fb4944f2f72e8bde6b59881_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://classicmodels.at:8080/forum/viewtopic.php
http://diva-code.at:8080/forum/viewtopic.php
-
payload_url
http://congres.eska.fr/HRb1AQC.exe
http://www.heliophos.com/aq4Aju.exe
http://www.Uniqueonlinejobs.us/6M0CRvB.exe
http://anthemmedia.com/FwLQgJ.exe
http://afyonmatbaa.com/A3td.exe
Targets
-
-
Target
e9f2888c5fb4944f2f72e8bde6b59881_JaffaCakes118
-
Size
188KB
-
MD5
e9f2888c5fb4944f2f72e8bde6b59881
-
SHA1
ad14dbb9c6dcb4d66d3e8e9959f82237b4658874
-
SHA256
3208ea6b8177e8e2abbba46516624677c0a19bc2760ec3ecb7ec6c05cccf631e
-
SHA512
2aae633c620878b3883cf5ae18d94482eb59ca531c025b22262f3110efe4a6f6a0913836995a57213af362901d46e469223cd2eb8f48453489359dce815182d0
-
SSDEEP
3072:lRMB80RZaVEVbq0OnPAXyC0FVPbU+n5noSH30TC:lOBLRZtGvnPAXn0jzJ5oSF
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-