General
-
Target
6bc5ab7a2b6bfc1746e93b12813c942f_JaffaCakes118
-
Size
156KB
-
Sample
241022-y1lm1athlm
-
MD5
6bc5ab7a2b6bfc1746e93b12813c942f
-
SHA1
6acd4c29e04cc6b3294b4d74d03d210bba906772
-
SHA256
6fbf5abab7dbd2ed8c5b626b4b06162cce1831efe2103ebe96043db72dd61269
-
SHA512
5e1b4bc58900cf55ebac3e1568e7023cf150fd7a447b6fcf3408064071aa828eb266f83632991e274035fd36243864ed2f3670a0ad84db39a0e735297a17cb54
-
SSDEEP
3072:ul89tSKkKRayiGcgAsr6TdNQYlE4DpCY45wpK2nqILOZfw4BMB/y5vGgXqv1rEIm:SmtSaRayiAAy6nQ8lCe3l6ZI0MB/SbXr
Static task
static1
Behavioral task
behavioral1
Sample
6bc5ab7a2b6bfc1746e93b12813c942f_JaffaCakes118.tar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6bc5ab7a2b6bfc1746e93b12813c942f_JaffaCakes118.tar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
eFAX.CORPORATE.personal.ID2EFR120091FRe1TT0932223545AEG32123434IP.new.pdf.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
eFAX.CORPORATE.personal.ID2EFR120091FRe1TT0932223545AEG32123434IP.new.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
vv/vv.pdf
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
vv/vv.pdf
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://ser.foryourcatonly.com/forum/viewtopic.php
http://ser.luckypetspetsitting.com/forum/viewtopic.php
-
payload_url
http://dechotheband.gr/5Wjm3iV2.exe
http://barisdogalurunler.com/9BMu2.exe
http://alpertarimurunleri.com/rRq.exe
http://oneglobalexchange.com/19J.exe
http://rumanas.org/1vAWoxz3.exe
http://www.10130138.wavelearn.de/4pxp.exe
http://visiosofttechnologies.com/iDm9vs.exe
http://sgisolution.com.br/jq5.exe
http://plusloinart.be/Ue7cHNm.exe
http://marengoit.pl/ZBrBpBh2.exe
Targets
-
-
Target
6bc5ab7a2b6bfc1746e93b12813c942f_JaffaCakes118
-
Size
160KB
-
MD5
97f7ee0017ff15f182af0724499f7a2e
-
SHA1
e9ca48cd0d624e9443bbb0f6fb48537f5f65eb5a
-
SHA256
7abe00638fafb697900111330f5d3c4512cbf7fc4f83345139ebc4c4d57f684b
-
SHA512
74c976edb7d1293b8ff58c0e4127a06645208aeb15bd9cc1b6454cdc493895e9426478efddc91332f1250b627b1e3e6ad2e7a3f05f5e4a13bf0612fdf679fa93
-
SSDEEP
3072:KM+Ru0P/V1+KRrH1E4DpCY45wpK2nqILOZfw4BxHdnkv9QQl95mR7d:KM+FP+E1lCe3l6ZI0xHdk1X/Q7d
Score1/10 -
-
-
Target
eFAX.CORPORATE.personal.ID2EFR120091FRe1TT0932223545AEG32123434IP.new.pdf.exe
-
Size
80KB
-
MD5
16625f5ee30ba33945b807fb0b8b2f9e
-
SHA1
a9759e9000a04fe090b4f7cfa9dde9b2c0947c54
-
SHA256
755d3ccd26b99ae2ccae8483847a2e42f8756884e1f11eb05d637d383d90362f
-
SHA512
ca0e2000e00843555c7917ee08f8910ffd1f319e4c206fb8dac28663186b02b0113e435b9e03e4e4e8ac64966d71130a922abcec16c224f0841196fa1be059c7
-
SSDEEP
1536:7MCEZ7wJSFfiaUflrb55qm4M5NUFdKMMM06LJyTHGvRkaoV/H7JAbh9Cuo3ZI:787w8jMt5qm4M5NUHM16ayRg/H1AtBoq
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
-
-
Target
vv/vv.pdf
-
Size
109KB
-
MD5
fe8882290d7fa1c4dc489075d16f4f93
-
SHA1
47bede05a2c78125b45890887acc28e2fc3f3d0e
-
SHA256
04266bd9cbc224c4f1ca78dccf0ec7c48ba81346ab55303fb9d49d3b55c3cc61
-
SHA512
a209c1ab3d6fbdaa4d8ae944cc53fab21ef1c7ccd744feb8bf81a4e7f72067ca5af90c23de3084d5f7e6748e4b78850c8930793645ad7aa92eb36e8af3a6e36b
-
SSDEEP
3072:hvo+TSa0iwPaCwxxZtiJeZxUa7i3aIbWm:hvo2LjwPpwzVpu3km
Score3/10 -