General
-
Target
f0a7a1ef68bf80596ec2048e4740cde2_JaffaCakes118
-
Size
1.1MB
-
Sample
240921-1dr8davflr
-
MD5
f0a7a1ef68bf80596ec2048e4740cde2
-
SHA1
31ea4c2649c0f7d6ac86e277aee377a149df38b0
-
SHA256
3a7e74024c233663dc9b627117a4df291f5a413cc829b5282f090941254365ee
-
SHA512
324510cffabe2dc6a26dc7f52c645bff2946fe0de70c04204af1d7f575833562bc352a3a87b7c3048247c4e777c0b0c094d95b1843a6d31f02dcc415cd7f0eea
-
SSDEEP
24576:cCdxte/80jYLT3U1jfsWalLT5gu0aDzQ:dw80cTsjkWalLT6
Static task
static1
Behavioral task
behavioral1
Sample
f0a7a1ef68bf80596ec2048e4740cde2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f0a7a1ef68bf80596ec2048e4740cde2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
f0a7a1ef68bf80596ec2048e4740cde2_JaffaCakes118
-
Size
1.1MB
-
MD5
f0a7a1ef68bf80596ec2048e4740cde2
-
SHA1
31ea4c2649c0f7d6ac86e277aee377a149df38b0
-
SHA256
3a7e74024c233663dc9b627117a4df291f5a413cc829b5282f090941254365ee
-
SHA512
324510cffabe2dc6a26dc7f52c645bff2946fe0de70c04204af1d7f575833562bc352a3a87b7c3048247c4e777c0b0c094d95b1843a6d31f02dcc415cd7f0eea
-
SSDEEP
24576:cCdxte/80jYLT3U1jfsWalLT5gu0aDzQ:dw80cTsjkWalLT6
-
Phoenix Keylogger payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-