General
-
Target
292bc3dc496528a9b746ead70389f521_JaffaCakes118
-
Size
543KB
-
Sample
240706-w213za1fjf
-
MD5
292bc3dc496528a9b746ead70389f521
-
SHA1
09e7998aeaa516e8c6baf19b2da1714d7680a596
-
SHA256
efae7b31af29601a11d4648abb3b27ec935fe97ea88468edf742d90c73ea0473
-
SHA512
97935ef1f0af6a2e3766fa14f908995d2555adc050344dc4a720c9fbf3dbfdb492839a08f94a9043cfae215ee02015a5ce60a8b8da822b2ef557fd65416aa16c
-
SSDEEP
12288:WtEBkXkAUqqSR2FO36UxOzX0g7jKBwEneoC:DAFzR20NxOzvKI
Static task
static1
Behavioral task
behavioral1
Sample
292bc3dc496528a9b746ead70389f521_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
292bc3dc496528a9b746ead70389f521_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.imginternational.xyz - Port:
587 - Username:
[email protected] - Password:
wiD(FZbJz5
Targets
-
-
Target
292bc3dc496528a9b746ead70389f521_JaffaCakes118
-
Size
543KB
-
MD5
292bc3dc496528a9b746ead70389f521
-
SHA1
09e7998aeaa516e8c6baf19b2da1714d7680a596
-
SHA256
efae7b31af29601a11d4648abb3b27ec935fe97ea88468edf742d90c73ea0473
-
SHA512
97935ef1f0af6a2e3766fa14f908995d2555adc050344dc4a720c9fbf3dbfdb492839a08f94a9043cfae215ee02015a5ce60a8b8da822b2ef557fd65416aa16c
-
SSDEEP
12288:WtEBkXkAUqqSR2FO36UxOzX0g7jKBwEneoC:DAFzR20NxOzvKI
Score10/10-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-