General
-
Target
23df00e50fc757a3f23f8cf7020a47eb_JaffaCakes118
-
Size
1.0MB
-
Sample
240703-3mg5wateqa
-
MD5
23df00e50fc757a3f23f8cf7020a47eb
-
SHA1
adacd29873f11d68340ed872d4a5c134d4ff4280
-
SHA256
fdba1fafc7558aab4e33e2a5c4bfe97fb43fdceb89795e9691275c948826da13
-
SHA512
92e8dcfcecdc032a1f3d1042f3814956478edeaaea84911754f5314806f6eebd7fb44cd791996f49386c68b94effca41e4be89685cbb855d040e4d9bf6a1de2e
-
SSDEEP
24576:OhLxZdCTltxV8alcUdQiynOOb7QkAfjh76EJ0ZqT3NsS:ObZwltxyazQiiXQkAfN7VJ0Q
Static task
static1
Behavioral task
behavioral1
Sample
0009876_xls.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0009876_xls.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1335107831:AAGZPoo67JukV78LJI16BeQqy3whx-zI59g/sendMessage?chat_id=1294593001
Targets
-
-
Target
0009876_xls.exe
-
Size
2.7MB
-
MD5
3631172fd1aef752e29af953a0f41c20
-
SHA1
d9c4e71b15ebd4dd7e61e0a2f5b8a4f7467cf7e6
-
SHA256
3bbc0ec07f8cbb9f26ed2262eaae8eff6bc14a220f6916f2a72b3be2d5e82ad5
-
SHA512
8c2fdf7550401337c2712d8426032dc8e1159f77c67037e391d375827ca82f58d22d1e4cea33f5df0cec6f7f318afc4032408c6cb030c6764d4bf4c96437bac5
-
SSDEEP
49152:5i20ajbQzlq5O+l4QOnn8jeX+l8uvlhfNf5lWLPNyeL9+hw/USGy7Xk/51HwgG9v:M60zlC6mq98MeeDQ1a7
Score10/10-
Beds Protector Packer
Detects Beds Protector packer used to load .NET malware.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-