General
-
Target
28a0bcda107fb1e915b3ec7e066a6e29_JaffaCakes118
-
Size
2.4MB
-
Sample
241009-b588javaqe
-
MD5
28a0bcda107fb1e915b3ec7e066a6e29
-
SHA1
bd99449f74591310c782e71c882f38c4c3f39c0b
-
SHA256
71ed926faa587e2474903f5c0bb521d4a25c0e7dee983de3ec3ca820b6608268
-
SHA512
bc08c781b850b0f60ad39ff2ebbf5ce2c4d1049d073f059b2e50606e5f5982ccff1c6712af7bb9028cf023770d4271f98dca0f4039cc0e86ba3416364769bbac
-
SSDEEP
49152:g7LpqPnAU0nJtOCsglhUDWA1/Y6jyq5r4Flw/HD5:G2+LFsfrdjB5Eg/t
Static task
static1
Behavioral task
behavioral1
Sample
28a0bcda107fb1e915b3ec7e066a6e29_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28a0bcda107fb1e915b3ec7e066a6e29_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
monkeyarman
Targets
-
-
Target
28a0bcda107fb1e915b3ec7e066a6e29_JaffaCakes118
-
Size
2.4MB
-
MD5
28a0bcda107fb1e915b3ec7e066a6e29
-
SHA1
bd99449f74591310c782e71c882f38c4c3f39c0b
-
SHA256
71ed926faa587e2474903f5c0bb521d4a25c0e7dee983de3ec3ca820b6608268
-
SHA512
bc08c781b850b0f60ad39ff2ebbf5ce2c4d1049d073f059b2e50606e5f5982ccff1c6712af7bb9028cf023770d4271f98dca0f4039cc0e86ba3416364769bbac
-
SSDEEP
49152:g7LpqPnAU0nJtOCsglhUDWA1/Y6jyq5r4Flw/HD5:G2+LFsfrdjB5Eg/t
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-