General
-
Target
39e19f7ca5e1b44736c9de8dd6ea71c6_JaffaCakes118
-
Size
188KB
-
Sample
241012-n4a1katdmj
-
MD5
39e19f7ca5e1b44736c9de8dd6ea71c6
-
SHA1
939e28c58f53296a0e35bc473620353e3ad20c46
-
SHA256
070cb7875728d4d7988b1f78951580687472447b60d471a8930057f659b79fda
-
SHA512
8dc3ec24ea2aa4ee73b139a3eec667790b10e9de8a769c5b13a4bd793fad640ebbff241d2e0495d6098d1e8d69b4231056452e5f990cb87408dddebe105bf7ee
-
SSDEEP
3072:n60eo9/9pOndxzSIS6OmmUFKdkhJk1Q71j/NL929:n6guxNS6LFKdk7kcHq
Static task
static1
Behavioral task
behavioral1
Sample
39e19f7ca5e1b44736c9de8dd6ea71c6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39e19f7ca5e1b44736c9de8dd6ea71c6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://13.carnovirious.net/forum/viewtopic.php
http://13.JONEMNOMINIK.NET/forum/viewtopic.php
http://13.LOMERDASTER.NET/forum/viewtopic.php
http://13.ZABAKARVESTER.NET/forum/viewtopic.php
-
payload_url
http://www.lichtseminare.at/a1fV.exe
http://ftp.spooncupftvtigercrm.com/dv7ej.exe
http://vt-nord.de/uLv.exe
http://apollo-spa.cz/VM011HeG.exe
http://www.it-systemer.de/Xd0.exe
http://ftp.studiosf.nazwa.pl/nbT4D8h.exe
Targets
-
-
Target
39e19f7ca5e1b44736c9de8dd6ea71c6_JaffaCakes118
-
Size
188KB
-
MD5
39e19f7ca5e1b44736c9de8dd6ea71c6
-
SHA1
939e28c58f53296a0e35bc473620353e3ad20c46
-
SHA256
070cb7875728d4d7988b1f78951580687472447b60d471a8930057f659b79fda
-
SHA512
8dc3ec24ea2aa4ee73b139a3eec667790b10e9de8a769c5b13a4bd793fad640ebbff241d2e0495d6098d1e8d69b4231056452e5f990cb87408dddebe105bf7ee
-
SSDEEP
3072:n60eo9/9pOndxzSIS6OmmUFKdkhJk1Q71j/NL929:n6guxNS6LFKdk7kcHq
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-