General
-
Target
ef9f54265ec815fa081af3200b9287f0_JaffaCakes118
-
Size
144KB
-
Sample
240921-ms8l1sybrj
-
MD5
ef9f54265ec815fa081af3200b9287f0
-
SHA1
15e7e3fc7e9a662868c282aece85132d3c410748
-
SHA256
2abb980259b7953f70ce5af1c6edaf02b5d517b5c9c5a12cb0fb77d1854fd3e3
-
SHA512
7f7fbcbcb7b04c4649e219d0d1610e49bd72c800f7b482247d6e299ecb1903793f77700a339bf19ab413b1aa2494411e374960160f67e523bc4d9f1fb414a5f5
-
SSDEEP
3072:WlCZwX7wRUPHbSnCZYoB1rLAxgutQb0HdUyY6CpaJFsZLoYHY:4CZwX0ySn8YoLLVrbwzuaj2rH
Static task
static1
Behavioral task
behavioral1
Sample
ef9f54265ec815fa081af3200b9287f0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ef9f54265ec815fa081af3200b9287f0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://74.53.97.66:8080/forum/viewtopic.php
http://74.53.97.67:8080/forum/viewtopic.php
-
payload_url
http://orion.obidigital.net/d09ZhGf.exe
http://ftp.lastraautosport.com.ar/xjH.exe
Targets
-
-
Target
ef9f54265ec815fa081af3200b9287f0_JaffaCakes118
-
Size
144KB
-
MD5
ef9f54265ec815fa081af3200b9287f0
-
SHA1
15e7e3fc7e9a662868c282aece85132d3c410748
-
SHA256
2abb980259b7953f70ce5af1c6edaf02b5d517b5c9c5a12cb0fb77d1854fd3e3
-
SHA512
7f7fbcbcb7b04c4649e219d0d1610e49bd72c800f7b482247d6e299ecb1903793f77700a339bf19ab413b1aa2494411e374960160f67e523bc4d9f1fb414a5f5
-
SSDEEP
3072:WlCZwX7wRUPHbSnCZYoB1rLAxgutQb0HdUyY6CpaJFsZLoYHY:4CZwX0ySn8YoLLVrbwzuaj2rH
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-