General
-
Target
f0f1583895386c2bf77a4fdee48fc4cf_JaffaCakes118
-
Size
1.1MB
-
Sample
240922-a3bntatcnd
-
MD5
f0f1583895386c2bf77a4fdee48fc4cf
-
SHA1
df02abba060791e255e9129a7819d6a3f332bd6f
-
SHA256
9ee1bd8d321c0f2b59c8d9005f174cfdee3476d00f5fa9005655d0ca6bb22afd
-
SHA512
26534e4d176e4b107b53df817e763b53be2c74d73ab67572a72ae9f6c6421cec601b371aad5fa238d3837a2cea3d5b85b5529c0521dd559ff651a8b6897c5143
-
SSDEEP
12288:nX2map3Mj6jRPLjRPqjBjjyjBjBjBjBjLjbJJYpekFFFEOmW2UyJ21aN0F3h2A6W:nmvzkFFFHRjx/l5D
Static task
static1
Behavioral task
behavioral1
Sample
f0f1583895386c2bf77a4fdee48fc4cf_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f0f1583895386c2bf77a4fdee48fc4cf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://bitrix370.timeweb.ru/ - Port:
21 - Username:
cn94754 - Password:
c2eitfpidhgS
Targets
-
-
Target
f0f1583895386c2bf77a4fdee48fc4cf_JaffaCakes118
-
Size
1.1MB
-
MD5
f0f1583895386c2bf77a4fdee48fc4cf
-
SHA1
df02abba060791e255e9129a7819d6a3f332bd6f
-
SHA256
9ee1bd8d321c0f2b59c8d9005f174cfdee3476d00f5fa9005655d0ca6bb22afd
-
SHA512
26534e4d176e4b107b53df817e763b53be2c74d73ab67572a72ae9f6c6421cec601b371aad5fa238d3837a2cea3d5b85b5529c0521dd559ff651a8b6897c5143
-
SSDEEP
12288:nX2map3Mj6jRPLjRPqjBjjyjBjBjBjBjLjbJJYpekFFFEOmW2UyJ21aN0F3h2A6W:nmvzkFFFHRjx/l5D
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-