General
-
Target
14c6d942188587ff0f29679de43a2528_JaffaCakes118
-
Size
167KB
-
Sample
241004-yzyaeaydqd
-
MD5
14c6d942188587ff0f29679de43a2528
-
SHA1
79c1f96ed01592c7e65c2e00f931a157c15f28e4
-
SHA256
7d4b5d1c4d2ac49cf030034937c48662bdb6bc3d765b2ae575d613a13c5ca46f
-
SHA512
cd457b1f340e1dd4d8d3167208f255d0b858f5b3d16f3743702ca2f7f4aa76595135bd3f7a1cc76178bf1f1489bc4b79392c922a7a89bba2aadfb450cdd5e8d5
-
SSDEEP
3072:XauB++hB+AYDt58T4Eu0RR61u/s9bLztDOCw9p+Wp+WIro:f7hG5y4Eug81Ss9bfsCw9dIr
Behavioral task
behavioral1
Sample
14c6d942188587ff0f29679de43a2528_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14c6d942188587ff0f29679de43a2528_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
asyncrat
Default
109.248.201.153:6606
109.248.201.153:7707
109.248.201.153:8808
https://api.telegram.org/bot1838160324:AAGx7G67cqyw7VeKRQ5YefPIsnWGShXlcCE/sendMessage?chat_id=1842845625
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
14c6d942188587ff0f29679de43a2528_JaffaCakes118
-
Size
167KB
-
MD5
14c6d942188587ff0f29679de43a2528
-
SHA1
79c1f96ed01592c7e65c2e00f931a157c15f28e4
-
SHA256
7d4b5d1c4d2ac49cf030034937c48662bdb6bc3d765b2ae575d613a13c5ca46f
-
SHA512
cd457b1f340e1dd4d8d3167208f255d0b858f5b3d16f3743702ca2f7f4aa76595135bd3f7a1cc76178bf1f1489bc4b79392c922a7a89bba2aadfb450cdd5e8d5
-
SSDEEP
3072:XauB++hB+AYDt58T4Eu0RR61u/s9bLztDOCw9p+Wp+WIro:f7hG5y4Eug81Ss9bfsCw9dIr
-
StormKitty payload
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1