General
-
Target
JaffaCakes118_147df2e568f7f1ab66c80ee3750071c8
-
Size
1.1MB
-
Sample
250106-hj7adayrbx
-
MD5
147df2e568f7f1ab66c80ee3750071c8
-
SHA1
95ae7d0650f3c0b3983bbc6c17e1906b3e885a08
-
SHA256
37a00c3fa2945635f627455fbe31e05146c69427df5dab9b9d0fa21a1bb14cb3
-
SHA512
e84bfb4b743377ea2d6fe1248ffa2e433b5d4d23d83c394ac6f92fb58cc840327eb734a87b21727bdad89f42ef522044710024ce5d5e6ec6808d1fd2ca39d694
-
SSDEEP
24576:w7rjjcpyXb3wGvgHFk9hYATuKYLLow2Fxa/a:cWyLKttLofxay
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_147df2e568f7f1ab66c80ee3750071c8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_147df2e568f7f1ab66c80ee3750071c8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
budgetn.shop - Port:
587 - Username:
[email protected] - Password:
FLM[l0rL!SL5
Targets
-
-
Target
JaffaCakes118_147df2e568f7f1ab66c80ee3750071c8
-
Size
1.1MB
-
MD5
147df2e568f7f1ab66c80ee3750071c8
-
SHA1
95ae7d0650f3c0b3983bbc6c17e1906b3e885a08
-
SHA256
37a00c3fa2945635f627455fbe31e05146c69427df5dab9b9d0fa21a1bb14cb3
-
SHA512
e84bfb4b743377ea2d6fe1248ffa2e433b5d4d23d83c394ac6f92fb58cc840327eb734a87b21727bdad89f42ef522044710024ce5d5e6ec6808d1fd2ca39d694
-
SSDEEP
24576:w7rjjcpyXb3wGvgHFk9hYATuKYLLow2Fxa/a:cWyLKttLofxay
Score10/10-
Blustealer family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-