General
-
Target
dbcfc21ffafc545f171df65dd419682a_JaffaCakes118
-
Size
940KB
-
Sample
240406-flayvabh34
-
MD5
dbcfc21ffafc545f171df65dd419682a
-
SHA1
7801722cb68ba9b3d5af59f9faa70277b530a9c0
-
SHA256
7d3323da32cb30fed5acbc1b1e0f053ee43d111a5c354c3bae95d580e54a7e79
-
SHA512
61a3da4da4217936965077772274ad1b1fd6db0005525704ced2b36d6f2543810dd2b69c727606b1ecc9e98be07d1524613f1737a773c005d377cb30663221bf
-
SSDEEP
12288:HCyhPc4hbmOwD71tJha6QSGYlrVs8tBnqRrfgwNaSctMXe:HCak8bmOKhtPUY8bxsMO
Static task
static1
Behavioral task
behavioral1
Sample
dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
dbcfc21ffafc545f171df65dd419682a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
warzonerat
pastorcc.duckdns.org:2223
Targets
-
-
Target
dbcfc21ffafc545f171df65dd419682a_JaffaCakes118
-
Size
940KB
-
MD5
dbcfc21ffafc545f171df65dd419682a
-
SHA1
7801722cb68ba9b3d5af59f9faa70277b530a9c0
-
SHA256
7d3323da32cb30fed5acbc1b1e0f053ee43d111a5c354c3bae95d580e54a7e79
-
SHA512
61a3da4da4217936965077772274ad1b1fd6db0005525704ced2b36d6f2543810dd2b69c727606b1ecc9e98be07d1524613f1737a773c005d377cb30663221bf
-
SSDEEP
12288:HCyhPc4hbmOwD71tJha6QSGYlrVs8tBnqRrfgwNaSctMXe:HCak8bmOKhtPUY8bxsMO
-
Detects BazaLoader malware
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-