General
-
Target
ca408f5d31588de6bb9bb76d8394025d_JaffaCakes118
-
Size
479KB
-
Sample
241206-bb2llaxncl
-
MD5
ca408f5d31588de6bb9bb76d8394025d
-
SHA1
6d7d4f847f159ad471e641eef00880cc222a3ac5
-
SHA256
beb4e718a61260ddfb99047fcfece07ff5a8d5712dea9740b34b57f87e4f63cc
-
SHA512
5267d4f64b89ccd8bb069a2d91649bf4793399342477fbf57515f5a2cbba6094e823d2f080f16ca13b91865a12159e3f74f76f16ecfd828c42f8198ccbc16a84
-
SSDEEP
12288:l0Y9hZ0xfz1l/ux+XtnEQtHfvL9N9+I112b73:P2tzP/uxanJHL112bL
Static task
static1
Behavioral task
behavioral1
Sample
ca408f5d31588de6bb9bb76d8394025d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ca408f5d31588de6bb9bb76d8394025d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
#/hsscp.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
#/hsscp.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ca408f5d31588de6bb9bb76d8394025d_JaffaCakes118
-
Size
479KB
-
MD5
ca408f5d31588de6bb9bb76d8394025d
-
SHA1
6d7d4f847f159ad471e641eef00880cc222a3ac5
-
SHA256
beb4e718a61260ddfb99047fcfece07ff5a8d5712dea9740b34b57f87e4f63cc
-
SHA512
5267d4f64b89ccd8bb069a2d91649bf4793399342477fbf57515f5a2cbba6094e823d2f080f16ca13b91865a12159e3f74f76f16ecfd828c42f8198ccbc16a84
-
SSDEEP
12288:l0Y9hZ0xfz1l/ux+XtnEQtHfvL9N9+I112b73:P2tzP/uxanJHL112bL
Score10/10-
StormKitty payload
-
Stormkitty family
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
#/hsscp.exe
-
Size
380KB
-
MD5
b88a964682e3c51a958b0b4e1c344404
-
SHA1
be5b6d51a7ce314fbcf56376968b8c0c3ba0965f
-
SHA256
8fad80310d1dce2cda4b9fea04cd75aeec42b0164a9ba5632adb1f0bd729b41d
-
SHA512
b3df0b55dc48f8f87f4662313174657c1084887e46d387a8891310039d03cffcbc75283eebca8460d8259b4398bd58d8dba36bec820c31c1a4a7e8726381c0b1
-
SSDEEP
3072:O0liXGGOCEvElZbiP3rL2F+jPNTY1dMFgX:zqEvtPbLW+bNTCdwO
Score1/10 -