General

  • Target

    JaffaCakes118_d0685bc174f43b12fcf3cb369624a23ecf8e88a1635dd69784dbc8e6ef70c6e6

  • Size

    390KB

  • MD5

    5ef571266d504223c1a7bf691afa5cd6

  • SHA1

    f988001ad05d9f7c815b063d472fdca20b33aed5

  • SHA256

    d0685bc174f43b12fcf3cb369624a23ecf8e88a1635dd69784dbc8e6ef70c6e6

  • SHA512

    b39a491d093e82ec06120231c590ad83605075b65fbbbcc36c0be6288657c3e9ec6ce36a505fd6b88845a7cb5ce6bdaa3e6aefb3c4a826e92476003018b21c5a

  • SSDEEP

    6144:1LNMiEalCzYB1GyH1lhONhO7VAzK6Guz/OEWoHCj34+aV3gBPPLvT3Wi6rit8:1LDlEYxluY7WZFV3gBrb376et8

Score
10/10

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.dm-teh.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Vm@(O;CO.vEQ

Signatures

  • Blustealer family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • JaffaCakes118_d0685bc174f43b12fcf3cb369624a23ecf8e88a1635dd69784dbc8e6ef70c6e6
    .zip

    Password: infected

  • 8bef9914316ad50fba06565f6b28596b2548affd3306d07c66123885b5fe8a6f
    .exe windows:4 windows x86 arch:x86

    6ec320695a6a58a7ee41d2f9e8a4623c


    Headers

    Imports

    Sections