General
-
Target
5b55d6c34fb68f8b4bc9e361ee038641_JaffaCakes118
-
Size
684KB
-
Sample
241019-hg35yasemh
-
MD5
5b55d6c34fb68f8b4bc9e361ee038641
-
SHA1
89e0d1840e1d4e6a708e0fabf376609863377a9f
-
SHA256
a636ac86f3f8c1341dd201eedfd702495aa0e313322d5c1318a5d1b623f0bb9d
-
SHA512
c45fb18cf1cf3aaea3ccc4425e12841c7c90cb610894f85e19c5fe831bfb8e93aab92572688a07e0677fd829023e5a963ff894045eef98941b54da56befffffc
-
SSDEEP
12288:0XCYJDX9rBoUX58/sSHZ4+3hGx5DkYjSs2:JYJDFBFX5CsMQ5dSs2
Static task
static1
Behavioral task
behavioral1
Sample
5b55d6c34fb68f8b4bc9e361ee038641_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5b55d6c34fb68f8b4bc9e361ee038641_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
reptw.xyz - Port:
587 - Username:
[email protected] - Password:
52u[w;$s$7Mn
Targets
-
-
Target
5b55d6c34fb68f8b4bc9e361ee038641_JaffaCakes118
-
Size
684KB
-
MD5
5b55d6c34fb68f8b4bc9e361ee038641
-
SHA1
89e0d1840e1d4e6a708e0fabf376609863377a9f
-
SHA256
a636ac86f3f8c1341dd201eedfd702495aa0e313322d5c1318a5d1b623f0bb9d
-
SHA512
c45fb18cf1cf3aaea3ccc4425e12841c7c90cb610894f85e19c5fe831bfb8e93aab92572688a07e0677fd829023e5a963ff894045eef98941b54da56befffffc
-
SSDEEP
12288:0XCYJDX9rBoUX58/sSHZ4+3hGx5DkYjSs2:JYJDFBFX5CsMQ5dSs2
Score10/10-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-