General
-
Target
ecec92df7dc52bcc3016714eb954fadd_JaffaCakes118
-
Size
315KB
-
Sample
240920-f5gwha1epk
-
MD5
ecec92df7dc52bcc3016714eb954fadd
-
SHA1
fa059149b8762c1c00fd22c5ce6433db713b72b7
-
SHA256
f22f62a1fa67190bb171f2b31406920ee9d45c5fc1e35240122d42b1bb19332a
-
SHA512
5bd5b0834293d515c6a3b370846b954a88f75abcd65307e48cc8ebb779f5bfaca8cf9e7a236aad8c1faba715c8ad0de4dd71867d4ca4a86ada86e9a9014fdc38
-
SSDEEP
6144:4wfiVqIuYDslV2p/9McX5Viw77T8g23YDXv:f6ANYD4gplMcXtj2Cv
Static task
static1
Behavioral task
behavioral1
Sample
New Order.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
New Order.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1619763442:AAF9ZnQOHpjS2SykbwtEgs7HaGdARK_xaDI/sendMessage?chat_id=1240574566
Targets
-
-
Target
New Order.exe
-
Size
778KB
-
MD5
2caebdfc35a2ee45de146ff816a682c6
-
SHA1
74cb36296951e7910d5c730c7bbbcb6648598ca5
-
SHA256
bc8df1915282e2e0682f70a348b91aab8282560beee4fd5f7b972cbc8240993a
-
SHA512
6a6f477c33bb5cb74aad9e6968e67b6caa52669f3939bdbbaef9b8181a25879775a29b622f4da92050546870a0aec7c7761acfd5a89e6f9971b05cf351066e8b
-
SSDEEP
6144:PX0CjSDMpra6QKIOmm1Ms6Wpty4dybDcSUsu76F+PgHth8Be9WzL5/iLlpBwMLb/:xp1Xum13FyMEFVj8BjGViCSityjK
-
Beds Protector Packer
Detects Beds Protector packer used to load .NET malware.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-