General
-
Target
a9d63ba83576c19bb1dbad9e85b51ecc_JaffaCakes118
-
Size
5.9MB
-
Sample
240403-3p4fwsgd8y
-
MD5
a9d63ba83576c19bb1dbad9e85b51ecc
-
SHA1
f37937e9afd6c78be38c58ebf84a03f66091c03c
-
SHA256
995d009e2fa6b510a0251895e0e71d0709ebfdeac782eae91caa3b4ee30bd29b
-
SHA512
e2ae86e9ace7e96c1097c5e570644824dcc07c9fc477bde54a43f91abadca11171cf649f9612e88107cb4cdfd700ff1e8a21c54d3432eb6f3089d9e6e3b65b62
-
SSDEEP
98304:JaZL5WwT7cp5HNGSNhOpW8XIw0J+OfIxJ67PYpVd9kxzamMHf42P8baI2BWcjOzF:JaZoYc5geAAILMYpBiam9e8OIiFOz8q
Static task
static1
Behavioral task
behavioral1
Sample
a9d63ba83576c19bb1dbad9e85b51ecc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9d63ba83576c19bb1dbad9e85b51ecc_JaffaCakes118.exe
Resource
win10v2004-20240319-en
Malware Config
Extracted
privateloader
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.znsjis.top/
Extracted
redline
she
135.181.129.119:4805
-
auth_value
b69102cdbd4afe2d3159f88fb6dac731
Extracted
vidar
41.4
916
https://mas.to/@sslam
-
profile_id
916
Extracted
nullmixer
http://hsiens.xyz/
Extracted
smokeloader
2020
http://directorycart.com/upload/
http://tierzahnarzt.at/upload/
http://streetofcards.com/upload/
http://ycdfzd.com/upload/
http://successcoachceo.com/upload/
http://uhvu.cn/upload/
http://japanarticle.com/upload/
Extracted
smokeloader
pub5
Extracted
gcleaner
ppp-gl.biz
45.9.20.13
Extracted
redline
ANI
194.104.136.5:46013
-
auth_value
9491a1c5e11eb6097e68a4fa8627fda8
Targets
-
-
Target
a9d63ba83576c19bb1dbad9e85b51ecc_JaffaCakes118
-
Size
5.9MB
-
MD5
a9d63ba83576c19bb1dbad9e85b51ecc
-
SHA1
f37937e9afd6c78be38c58ebf84a03f66091c03c
-
SHA256
995d009e2fa6b510a0251895e0e71d0709ebfdeac782eae91caa3b4ee30bd29b
-
SHA512
e2ae86e9ace7e96c1097c5e570644824dcc07c9fc477bde54a43f91abadca11171cf649f9612e88107cb4cdfd700ff1e8a21c54d3432eb6f3089d9e6e3b65b62
-
SSDEEP
98304:JaZL5WwT7cp5HNGSNhOpW8XIw0J+OfIxJ67PYpVd9kxzamMHf42P8baI2BWcjOzF:JaZoYc5geAAILMYpBiam9e8OIiFOz8q
-
Detect Fabookie payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Socelars payload
-
OnlyLogger payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-
-
-
Target
setup_installer.exe
-
Size
5.8MB
-
MD5
2a63fa2ace27f76ad1a17c6f1bb01353
-
SHA1
44fa3ece4acf17cfc51a36960f65b8bd81feea5e
-
SHA256
642c69b7109f087d01166ed237a4fd4611a2209a11e23a8dc2f2ba5aec3118bc
-
SHA512
711d462e56226e3170fd63cc87362a046ae398bc33258d3fc7cefdb1f973a266848b6b4510f60ffbfdfedfff980d2e346af0fa6e2b841624aae0f04ebb82a9e1
-
SSDEEP
98304:xdCvLUBsgpWUYPj63Gk5IZe8/VhubqRxKKIW70qRfnpq9vj8nzGyzORX929Y:x+LUCgpWUIpk5IZhfuEx/575PpqlRky
-
Detect Fabookie payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Socelars payload
-
OnlyLogger payload
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-