General
-
Target
f281e6f97227cfdcb2edca1037fb0efb_JaffaCakes118
-
Size
827KB
-
Sample
240922-v84a8s1hmg
-
MD5
f281e6f97227cfdcb2edca1037fb0efb
-
SHA1
745c3bd6b590aee05eb9af4bb6241df002796873
-
SHA256
67108fc6d911e90188c65b91728152289ba95b48ab037fecf68822c818c4c812
-
SHA512
e0e21957ffaf42e1f7d6192a77c1c60313b293860bfd8f82f54568d5249782e891ac8b2e3f4133f2e26d3c6433594b13086c68127f16d769fbc61245d209c2d8
-
SSDEEP
12288:Sl4XsYCvxGbhXycaJ1JY5U2OgwXtr2R72pn+ixmeE2wT:79CpGdy9J1m5Vo2R7Cn+i8/1
Static task
static1
Behavioral task
behavioral1
Sample
f281e6f97227cfdcb2edca1037fb0efb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f281e6f97227cfdcb2edca1037fb0efb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://bitrix370.timeweb.ru/ - Port:
21 - Username:
cn94754 - Password:
c2eitfpidhgS
Targets
-
-
Target
f281e6f97227cfdcb2edca1037fb0efb_JaffaCakes118
-
Size
827KB
-
MD5
f281e6f97227cfdcb2edca1037fb0efb
-
SHA1
745c3bd6b590aee05eb9af4bb6241df002796873
-
SHA256
67108fc6d911e90188c65b91728152289ba95b48ab037fecf68822c818c4c812
-
SHA512
e0e21957ffaf42e1f7d6192a77c1c60313b293860bfd8f82f54568d5249782e891ac8b2e3f4133f2e26d3c6433594b13086c68127f16d769fbc61245d209c2d8
-
SSDEEP
12288:Sl4XsYCvxGbhXycaJ1JY5U2OgwXtr2R72pn+ixmeE2wT:79CpGdy9J1m5Vo2R7Cn+i8/1
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-