General
-
Target
090ac0f3fe6de10df0db9d4b54d7b4e9_JaffaCakes118
-
Size
155KB
-
Sample
241002-ft7msasejg
-
MD5
090ac0f3fe6de10df0db9d4b54d7b4e9
-
SHA1
1e02117a8e966b875d2a0a0cafa3873c980059fb
-
SHA256
2b457552bd2c2f958c9a51267a4db67b8bd84cc17a9d3d21e4e69d39f64596e5
-
SHA512
d6fb51e0a5be3228635e05c95e61a9ec4eceaaa7d1db2e3b63a551b1b483e3e77554f1dd290c58c1c1293fb236e016813a41d4d35f22f108661fb74284619668
-
SSDEEP
3072:p7V+vy40ljSe5bS1dSelzEAOvSWLcNEDi+wjtk0V2i:Rs0ljb52b/nOvSWAf1tk0VP
Static task
static1
Behavioral task
behavioral1
Sample
090ac0f3fe6de10df0db9d4b54d7b4e9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
090ac0f3fe6de10df0db9d4b54d7b4e9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://googleapis.com/gate.php
http://web-cdn-node.com/gate.php
http://fbstatic-a.akamaihd.net/gate.php
http://l.yimg.com/gate.php
http://simple-cdn-node.com/gate.php
http://nym1.ib.adnxs.com/gate.php
http://cloud13.browser.ovi.com/gate.php
http://web-cdn-node.com/1.exe?c=1
-
payload_url
http://web-cdn-node.com/6.exe
Targets
-
-
Target
090ac0f3fe6de10df0db9d4b54d7b4e9_JaffaCakes118
-
Size
155KB
-
MD5
090ac0f3fe6de10df0db9d4b54d7b4e9
-
SHA1
1e02117a8e966b875d2a0a0cafa3873c980059fb
-
SHA256
2b457552bd2c2f958c9a51267a4db67b8bd84cc17a9d3d21e4e69d39f64596e5
-
SHA512
d6fb51e0a5be3228635e05c95e61a9ec4eceaaa7d1db2e3b63a551b1b483e3e77554f1dd290c58c1c1293fb236e016813a41d4d35f22f108661fb74284619668
-
SSDEEP
3072:p7V+vy40ljSe5bS1dSelzEAOvSWLcNEDi+wjtk0V2i:Rs0ljb52b/nOvSWAf1tk0VP
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-