General
-
Target
fc4a13b21b8d34ed0e7f2d3bdbc37d4e_JaffaCakes118
-
Size
190KB
-
Sample
240928-pk26dawaln
-
MD5
fc4a13b21b8d34ed0e7f2d3bdbc37d4e
-
SHA1
e4b07806cef3c26f61940663e8c1aa73318dea51
-
SHA256
67323f1798c2e845d52b7a7d63a436170268a92f3351934833c1ce3f8a064900
-
SHA512
74d9fc46f3234982011701f272f53ae4001de0a8005dcc76110f90aab9c8c581c7935b4eb2ca9285bb1863286dca584178f20484def9c8cd754ffbe6aa518d8f
-
SSDEEP
3072:vOfAbt1dj2pDE6JHvr48gBs+Zaupb3coC+oF30SN:vOmXqLJPr48g/ZolH
Static task
static1
Behavioral task
behavioral1
Sample
fc4a13b21b8d34ed0e7f2d3bdbc37d4e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc4a13b21b8d34ed0e7f2d3bdbc37d4e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://classicmodels.at:8080/forum/viewtopic.php
http://diva-code.at:8080/forum/viewtopic.php
-
payload_url
http://www.welatec.ch/3K8T5Hu.exe
http://www.acibr.org.br/PATgKq.exe
http://cloudfast.com.br/tjV.exe
Targets
-
-
Target
fc4a13b21b8d34ed0e7f2d3bdbc37d4e_JaffaCakes118
-
Size
190KB
-
MD5
fc4a13b21b8d34ed0e7f2d3bdbc37d4e
-
SHA1
e4b07806cef3c26f61940663e8c1aa73318dea51
-
SHA256
67323f1798c2e845d52b7a7d63a436170268a92f3351934833c1ce3f8a064900
-
SHA512
74d9fc46f3234982011701f272f53ae4001de0a8005dcc76110f90aab9c8c581c7935b4eb2ca9285bb1863286dca584178f20484def9c8cd754ffbe6aa518d8f
-
SSDEEP
3072:vOfAbt1dj2pDE6JHvr48gBs+Zaupb3coC+oF30SN:vOmXqLJPr48g/ZolH
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-