General
-
Target
88ab72a8230256e35d76b544cb2c830e_JaffaCakes118
-
Size
536KB
-
Sample
240402-k887dacf4z
-
MD5
88ab72a8230256e35d76b544cb2c830e
-
SHA1
32db8cba17b8f7d902f4cc92c7b096456f018547
-
SHA256
1298c6133f76de5491828ab2eac13325c21249a1329c971f6b60e7ed85827280
-
SHA512
f3e609825b8e1d31f867642967280d8370f631e093a4db2501ee0f3d30af41db8a0721ccc954a1a51e29c1572f6532464e4bf4042e3e74dac4b0727ae66ee38f
-
SSDEEP
12288:zJEA6MkVzE+5t6JGbmXSaotHTf8wfcZLKna:zyI6Z6JGbmXSaMHL8yc8na
Static task
static1
Behavioral task
behavioral1
Sample
88ab72a8230256e35d76b544cb2c830e_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88ab72a8230256e35d76b544cb2c830e_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
88ab72a8230256e35d76b544cb2c830e_JaffaCakes118
-
Size
536KB
-
MD5
88ab72a8230256e35d76b544cb2c830e
-
SHA1
32db8cba17b8f7d902f4cc92c7b096456f018547
-
SHA256
1298c6133f76de5491828ab2eac13325c21249a1329c971f6b60e7ed85827280
-
SHA512
f3e609825b8e1d31f867642967280d8370f631e093a4db2501ee0f3d30af41db8a0721ccc954a1a51e29c1572f6532464e4bf4042e3e74dac4b0727ae66ee38f
-
SSDEEP
12288:zJEA6MkVzE+5t6JGbmXSaotHTf8wfcZLKna:zyI6Z6JGbmXSaMHL8yc8na
Score10/10-
Bazar/Team9 Loader payload
-
Blocklisted process makes network request
-
Tries to connect to .bazar domain
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-