General
-
Target
4a67cb6ed0cf60ddcf3e45917898dec4_JaffaCakes118
-
Size
5.1MB
-
Sample
240331-cl3gbabh5x
-
MD5
4a67cb6ed0cf60ddcf3e45917898dec4
-
SHA1
b219ad475097853384d95a0924727389e8610ccb
-
SHA256
cebf4c9af84506f3b683d5d4867b739244b6ba595772d583b3455781c4d91b74
-
SHA512
aa9c91076de6a134df17ef9a2c2b78dc268b7f7dbb2eafa36b63fdfd20b329a58f08e096e2a61dcbbd85399bd8597e08a6e493d1ab1d54fd840918612ff01620
-
SSDEEP
98304:h3OOqyTG+H9QG7l1rvQjPleoGI9Wek2WiCU+gw6pTslbqXD09r/:9pRl1L0P4or9ytiG6WlmD09r/
Static task
static1
Behavioral task
behavioral1
Sample
4a67cb6ed0cf60ddcf3e45917898dec4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4a67cb6ed0cf60ddcf3e45917898dec4_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
sad
107.172.13.162:42751
-
auth_value
e0d869e5b6b2c87306c1e350a5d1e544
Extracted
gcleaner
ggg-cl.biz
45.9.20.13
Extracted
vidar
41.2
933
https://mas.to/@serg4325
-
profile_id
933
Targets
-
-
Target
4a67cb6ed0cf60ddcf3e45917898dec4_JaffaCakes118
-
Size
5.1MB
-
MD5
4a67cb6ed0cf60ddcf3e45917898dec4
-
SHA1
b219ad475097853384d95a0924727389e8610ccb
-
SHA256
cebf4c9af84506f3b683d5d4867b739244b6ba595772d583b3455781c4d91b74
-
SHA512
aa9c91076de6a134df17ef9a2c2b78dc268b7f7dbb2eafa36b63fdfd20b329a58f08e096e2a61dcbbd85399bd8597e08a6e493d1ab1d54fd840918612ff01620
-
SSDEEP
98304:h3OOqyTG+H9QG7l1rvQjPleoGI9Wek2WiCU+gw6pTslbqXD09r/:9pRl1L0P4or9ytiG6WlmD09r/
-
Detect Fabookie payload
-
Detects LgoogLoader payload
-
Detects PseudoManuscrypt payload
-
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
PseudoManuscrypt
PseudoManuscrypt is a malware Lazarus’s Manuscrypt targeting government organizations and ICS.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
OnlyLogger payload
-
Vidar Stealer
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-