General
-
Target
JaffaCakes118_22627068c23fb27e7aaac9d20e3807c32324e7ff832eaa26548fd1ccfb9722ef
-
Size
701KB
-
Sample
241222-ek7qrasqhm
-
MD5
3ca36a88b565e255b8531dafbe49eed3
-
SHA1
6e13c3b48b521408c7650b9971e930c2833cbb63
-
SHA256
22627068c23fb27e7aaac9d20e3807c32324e7ff832eaa26548fd1ccfb9722ef
-
SHA512
d44a1b7b16ee527f8239791c5993b28cd6898aa2a66b55e6acc66449365d8423a2c34c2da6b6189fb1691c28a1df7978c87a4c983382c456c023e5cc686128e7
-
SSDEEP
12288:8m6c3YbDOQ9q9G4H79j9tH9vLJzDFEn8Kg32uW2gHV/vC+DgBoI1Nh/VjfuyJEt9:n3Y/OQz4j19lNwU3vo8+DeNDjmoxGV
Static task
static1
Behavioral task
behavioral1
Sample
d3cd3076d9df007e13f80cb032ccceefb8017ef6f3ea80cc02b5f0f737405075.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d3cd3076d9df007e13f80cb032ccceefb8017ef6f3ea80cc02b5f0f737405075.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
xgvxyzvxwt.vbs
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
xgvxyzvxwt.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
zhwhki.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
zhwhki.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d3cd3076d9df007e13f80cb032ccceefb8017ef6f3ea80cc02b5f0f737405075.exe
-
Size
713KB
-
MD5
223c59e071cfa0c3931a18df26669606
-
SHA1
666735c53a6fe5569d61598b5769f180089957ba
-
SHA256
d3cd3076d9df007e13f80cb032ccceefb8017ef6f3ea80cc02b5f0f737405075
-
SHA512
671a4c67c49b722ac0b971b122d4a5724ce05ee87e4dd05f6d8c7cccc89e0c23b30e3d482d4dc564f2c1a977b0e4787d01663c46f7680444c613860d8f3355af
-
SSDEEP
12288:XJEm10Qb/p87R9ZUH4PJZhr3MKnkUqwSlJZRQbLv5BnPg5qC3hnuMd9A3Fu:XJT1jzp87RsHSfhDMKnkUTgZGLvbPKqI
-
Snake Keylogger payload
-
Snakekeylogger family
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
xgvxyzvxwt.au3
-
Size
6KB
-
MD5
cea25eafec4235e42120c4492dc98b5c
-
SHA1
fa9a75cc2cdea3d78241b2b48573f0d7b75e9bc3
-
SHA256
dde1986fe665769b139c1f90acde795ba56c87d3cf919cde2d17ba2a65f1a47b
-
SHA512
dbe16e29af68d885790bf01b8f72de1879714ddc0f9e939fd169b5507966fc91df96de6c0dc1110482e16f7f1eeca0f9e5c546d151686b1251790e6197ffbc50
-
SSDEEP
96:WRussTtP++tTYtRu8tdRussTtP++tRLPY8tORussRL8sURs/sYwIYTRP4/u8PqZj:WR7+QKYxP+QpUD0+ZncCF4SReT
Score1/10 -
-
-
Target
zhwhki.exe
-
Size
925KB
-
MD5
0adb9b817f1df7807576c2d7068dd931
-
SHA1
4a1b94a9a5113106f40cd8ea724703734d15f118
-
SHA256
98e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
-
SHA512
883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a
-
SSDEEP
24576:fYgAon+KfqNbXD2XJ2PH1ddATgs/u2kaCB+l:f37+KSbq5e1diEnHaCK
Score3/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4