General
-
Target
2b53286bb7ffd5815d84282d4011d66d_JaffaCakes118
-
Size
4.5MB
-
Sample
240329-ympgqsgd71
-
MD5
2b53286bb7ffd5815d84282d4011d66d
-
SHA1
dc94c45a64975a66edfa975f8adb7fbcaa98ea51
-
SHA256
d7b0380241e4d47fc00e72faa08831b51b0ae360d5ccc45717f39f3106c3020a
-
SHA512
4864452ab494330f9cc9bd7cff14701e15cba614d8cd2053c8ea3dd2c8fd6566da69d28ef07f4d49d01619b831733289a36952ac00e455699db94e1346363e98
-
SSDEEP
98304:JkZlS29v0XERypMbYCev1eRcnRVh1j/1KspBSXGNt8lSOl7V56S3:J+WXEREmYrNeCZ1jcW8XGb8IO5T6S3
Static task
static1
Behavioral task
behavioral1
Sample
2b53286bb7ffd5815d84282d4011d66d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b53286bb7ffd5815d84282d4011d66d_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
setup_installer.exe
Resource
win10v2004-20240319-en
Malware Config
Extracted
nullmixer
http://hsiens.xyz/
Extracted
privateloader
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.znsjis.top/
Extracted
gcleaner
ppp-gl.biz
45.9.20.13
Extracted
smokeloader
pub5
Extracted
vidar
41.4
916
https://mas.to/@sslam
-
profile_id
916
Extracted
redline
ANI
194.104.136.5:46013
-
auth_value
9491a1c5e11eb6097e68a4fa8627fda8
Extracted
redline
fuck1
135.181.129.119:4805
-
auth_value
b69102cdbd4afe2d3159f88fb6dac731
Extracted
redline
media17
91.121.67.60:2151
-
auth_value
e37d5065561884bb54c8ed1baa6de446
Extracted
smokeloader
2020
http://directorycart.com/upload/
http://tierzahnarzt.at/upload/
http://streetofcards.com/upload/
http://ycdfzd.com/upload/
http://successcoachceo.com/upload/
http://uhvu.cn/upload/
http://japanarticle.com/upload/
Targets
-
-
Target
2b53286bb7ffd5815d84282d4011d66d_JaffaCakes118
-
Size
4.5MB
-
MD5
2b53286bb7ffd5815d84282d4011d66d
-
SHA1
dc94c45a64975a66edfa975f8adb7fbcaa98ea51
-
SHA256
d7b0380241e4d47fc00e72faa08831b51b0ae360d5ccc45717f39f3106c3020a
-
SHA512
4864452ab494330f9cc9bd7cff14701e15cba614d8cd2053c8ea3dd2c8fd6566da69d28ef07f4d49d01619b831733289a36952ac00e455699db94e1346363e98
-
SSDEEP
98304:JkZlS29v0XERypMbYCev1eRcnRVh1j/1KspBSXGNt8lSOl7V56S3:J+WXEREmYrNeCZ1jcW8XGb8IO5T6S3
-
Detect Fabookie payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Socelars payload
-
OnlyLogger payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
-
-
Target
setup_installer.exe
-
Size
4.5MB
-
MD5
4d5c21bfe39f5141679fd7f64bb45e61
-
SHA1
6f2993b3e4991c7e2d532a62654d5dbde6c51f24
-
SHA256
376b5ced10c2870c93496d8171bc6b710aad552d39e019e2abca6896b1290eb1
-
SHA512
66d8f6c4a64eec592507c95d4598dcd2fc02b0dc3529b5d42bd4440bfd2a20a769f5d7745b06b3850f0601250a20ded89898a32736d4827cda812c177ad2e9d8
-
SSDEEP
98304:xXCvLUBsgY24YkhC9JuIoqGGyuA8/LDeWffNAZaIZpHssPGa/B:xULUCgY6ehIoNG3A8PeWfUaIZpHss+K
-
Detect Fabookie payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Socelars payload
-
OnlyLogger payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-