General
-
Target
f3c1e2686a27b1be0e337cf2f43b7468_JaffaCakes118
-
Size
1.5MB
-
Sample
241215-nfp5kssmex
-
MD5
f3c1e2686a27b1be0e337cf2f43b7468
-
SHA1
4046c4c66512265090cbb7e1410d374df6758417
-
SHA256
90128feadee82e9fa35d046c57e3031c562f4cbe766bbe1bc585270f94d2fe30
-
SHA512
461db463eee51d734c2ac974861a16973edb44bf6a24542a17aafb2f5baf5484e4581069890d4fa6a93f1daa04b552e8e488c8dfcfe127e5ea79c3fbafa1110d
-
SSDEEP
24576:z58wvtcbFLiO/zH3NGCswzncoJ7yRoLSEBs8z:z58WQZJGCswzcmGRo
Static task
static1
Behavioral task
behavioral1
Sample
f3c1e2686a27b1be0e337cf2f43b7468_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.nascenthotels.com - Port:
21 - Username:
[email protected] - Password:
NGozi@?11122$%@uak
Targets
-
-
Target
f3c1e2686a27b1be0e337cf2f43b7468_JaffaCakes118
-
Size
1.5MB
-
MD5
f3c1e2686a27b1be0e337cf2f43b7468
-
SHA1
4046c4c66512265090cbb7e1410d374df6758417
-
SHA256
90128feadee82e9fa35d046c57e3031c562f4cbe766bbe1bc585270f94d2fe30
-
SHA512
461db463eee51d734c2ac974861a16973edb44bf6a24542a17aafb2f5baf5484e4581069890d4fa6a93f1daa04b552e8e488c8dfcfe127e5ea79c3fbafa1110d
-
SSDEEP
24576:z58wvtcbFLiO/zH3NGCswzncoJ7yRoLSEBs8z:z58WQZJGCswzcmGRo
-
Hawkeye family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-