General
-
Target
cf81574bfd0c34bffb636efa63efa0f0_JaffaCakes118
-
Size
428KB
-
Sample
240405-k4668agb3x
-
MD5
cf81574bfd0c34bffb636efa63efa0f0
-
SHA1
fa186795a1de315edd7988be44346607a80f3a85
-
SHA256
bce700e3f98fb9c8f690133b52da7ebd187be3ccb18ca9b54444ec6fcfef9a0b
-
SHA512
c30f5e35182bfb01593fcd1b9518edd563117a5ea17b008db6259fb453fc932c87d8367f7d8dc7bc278c0900dc632c880fd50b318d912fdcaeb49f2507c655bd
-
SSDEEP
12288:ecYl31OjetfMs3C79vAJ5Jas677NwV2oC8:ec831O+f/9oo
Static task
static1
Behavioral task
behavioral1
Sample
cf81574bfd0c34bffb636efa63efa0f0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cf81574bfd0c34bffb636efa63efa0f0_JaffaCakes118.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
babylonrat
queda2122.ddns.net
Targets
-
-
Target
cf81574bfd0c34bffb636efa63efa0f0_JaffaCakes118
-
Size
428KB
-
MD5
cf81574bfd0c34bffb636efa63efa0f0
-
SHA1
fa186795a1de315edd7988be44346607a80f3a85
-
SHA256
bce700e3f98fb9c8f690133b52da7ebd187be3ccb18ca9b54444ec6fcfef9a0b
-
SHA512
c30f5e35182bfb01593fcd1b9518edd563117a5ea17b008db6259fb453fc932c87d8367f7d8dc7bc278c0900dc632c880fd50b318d912fdcaeb49f2507c655bd
-
SSDEEP
12288:ecYl31OjetfMs3C79vAJ5Jas677NwV2oC8:ec831O+f/9oo
Score10/10-
Babylonrat family
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-