General
-
Target
eac105e5bb9ebb983ff160f900e8c9c8_JaffaCakes118
-
Size
502KB
-
Sample
240919-g5zlzsvdkg
-
MD5
eac105e5bb9ebb983ff160f900e8c9c8
-
SHA1
22447353bd4513e9bc83eb6519d144b48ef7a804
-
SHA256
17ef0fc9f1d3ae56620d04b98efe906145ee48dab9ea50bfe4b79323af486132
-
SHA512
c2883ef1a84cdd03be25c399df7af0659d6f2b06de45015ebd8157212a9eb26250efe3df41e43ec318271e93698e382d8b951a8d94b64657138618e4ce810a93
-
SSDEEP
6144:SbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9bHP:SQtqB5urTIoYWBQk1E+VF9mOx9D
Static task
static1
Behavioral task
behavioral1
Sample
eac105e5bb9ebb983ff160f900e8c9c8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac105e5bb9ebb983ff160f900e8c9c8_JaffaCakes118.exe
Resource
win10v2004-20240910-en
Malware Config
Targets
-
-
Target
eac105e5bb9ebb983ff160f900e8c9c8_JaffaCakes118
-
Size
502KB
-
MD5
eac105e5bb9ebb983ff160f900e8c9c8
-
SHA1
22447353bd4513e9bc83eb6519d144b48ef7a804
-
SHA256
17ef0fc9f1d3ae56620d04b98efe906145ee48dab9ea50bfe4b79323af486132
-
SHA512
c2883ef1a84cdd03be25c399df7af0659d6f2b06de45015ebd8157212a9eb26250efe3df41e43ec318271e93698e382d8b951a8d94b64657138618e4ce810a93
-
SSDEEP
6144:SbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9bHP:SQtqB5urTIoYWBQk1E+VF9mOx9D
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-