General
-
Target
a6e9b1557039c81fc4d4afabc0399f6a_JaffaCakes118
-
Size
5.1MB
-
Sample
240403-z6dp1sdd88
-
MD5
a6e9b1557039c81fc4d4afabc0399f6a
-
SHA1
0be9fb79d915d83e1f0566a428becd18660edcd9
-
SHA256
93dc6becd9d4c16eecf188a19798f9cbbde3281270efe869f8f6c81a7815a74f
-
SHA512
da8772164b38eacb523a551b6a36d96857e21154586f6d5e8aa0116bc50cb634039171988167c6631aa7a39d30d48d3f978010b307a2ed57918b51e56beadebb
-
SSDEEP
98304:oPdx/6o/EJ6N6ExIxrnumYqF2w/IXO1tL6l5fj4yRDepJ:oL6ocnTWXE+l5f3iJ
Static task
static1
Behavioral task
behavioral1
Sample
a6e9b1557039c81fc4d4afabc0399f6a_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
cryptbot
cemujq44.top
morihg04.top
Targets
-
-
Target
a6e9b1557039c81fc4d4afabc0399f6a_JaffaCakes118
-
Size
5.1MB
-
MD5
a6e9b1557039c81fc4d4afabc0399f6a
-
SHA1
0be9fb79d915d83e1f0566a428becd18660edcd9
-
SHA256
93dc6becd9d4c16eecf188a19798f9cbbde3281270efe869f8f6c81a7815a74f
-
SHA512
da8772164b38eacb523a551b6a36d96857e21154586f6d5e8aa0116bc50cb634039171988167c6631aa7a39d30d48d3f978010b307a2ed57918b51e56beadebb
-
SSDEEP
98304:oPdx/6o/EJ6N6ExIxrnumYqF2w/IXO1tL6l5fj4yRDepJ:oL6ocnTWXE+l5f3iJ
-
Babadeda Crypter
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-