General
-
Target
JaffaCakes118_79b53b86991e5b293effb6faa90284fe
-
Size
397KB
-
Sample
250316-lbcmkszrz9
-
MD5
79b53b86991e5b293effb6faa90284fe
-
SHA1
9151154b037719cc2aa821b648f1c2331cefc7a6
-
SHA256
9d9cacaa68b36a6f322d14f7e5329c199b28c35b4e9ca62cc8d30173886e6de5
-
SHA512
e86bf2de2c8c0412ca5bde426311839c16a6b76306236e3cf205d3ec0385fdf0bfa6be26bf007be1a8af4fff6ae6b84154cf0541f671d114ad506b6da13c78e6
-
SSDEEP
6144:Sf/YM7555/4zAaEpV3s6tdmtcwOixAkV94xtFwRH/KGjZCZDKvg:SfUfEpvuxxd94xvCfKICZDKo
Behavioral task
behavioral1
Sample
JaffaCakes118_79b53b86991e5b293effb6faa90284fe.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_79b53b86991e5b293effb6faa90284fe.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
Protocol: smtp- Host:
Smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
myhackername
Targets
-
-
Target
JaffaCakes118_79b53b86991e5b293effb6faa90284fe
-
Size
397KB
-
MD5
79b53b86991e5b293effb6faa90284fe
-
SHA1
9151154b037719cc2aa821b648f1c2331cefc7a6
-
SHA256
9d9cacaa68b36a6f322d14f7e5329c199b28c35b4e9ca62cc8d30173886e6de5
-
SHA512
e86bf2de2c8c0412ca5bde426311839c16a6b76306236e3cf205d3ec0385fdf0bfa6be26bf007be1a8af4fff6ae6b84154cf0541f671d114ad506b6da13c78e6
-
SSDEEP
6144:Sf/YM7555/4zAaEpV3s6tdmtcwOixAkV94xtFwRH/KGjZCZDKvg:SfUfEpvuxxd94xvCfKICZDKo
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-