General
-
Target
efc7d02e2f0b147e72ff03b054de99e7_JaffaCakes118
-
Size
1.4MB
-
Sample
240921-ph7cbascjj
-
MD5
efc7d02e2f0b147e72ff03b054de99e7
-
SHA1
1bde0445f489bbce2426e9757425168553499581
-
SHA256
649f9f6ead85d535904aa3f25117823a0c6d1832c5362ee62404a7b55279fe1a
-
SHA512
0dbfee2e8324f4ea2ff313a770a081a9096c3e1921c4ace14151963c949f001877096c5bb8a3b1dc9c998ffa0c0505a63e5d026c054f59492c98903a83fc1d49
-
SSDEEP
12288:aCUIIeuQuojWsZi9701LJkIxYatI2lS/ng677jlz1Y3CPTpKkvhA9U6CQSiyyjK:J9ZHyIxA20/n1jDYSPTkkvC9Bd8
Static task
static1
Behavioral task
behavioral1
Sample
DHL_FORM_00029168873.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DHL_FORM_00029168873.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1634002210:AAGipukUEr-bNBgl2R1_hwFgfb9ez_v6wzE/sendMessage?chat_id=1401219117
Targets
-
-
Target
DHL_FORM_00029168873.exe
-
Size
894KB
-
MD5
6d5f919bcefabc102d81d5f747f4360f
-
SHA1
471587727f4fc7bfa80c65fddb7776f857d3dec2
-
SHA256
ac5d6e70caa2b1bde2cb167ff73f45fb54a80d23776869323612c426e7eab476
-
SHA512
7dfbd3cc0127c737b09a97001f76507f974e29f07635655c7d4a0d8a8c33b3cc2499a3eff8ddd418f51f8e9ae8c92aa0de062b32cd0d51c37b2e8f83c13527cd
-
SSDEEP
12288:mCUIIeuQuojWsZi9701LJkIxYatI2lS/ng677jlz1Y3CPTpKkvhA9U6CQSiyyjK:l9ZHyIxA20/n1jDYSPTkkvC9Bd8
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-