Resubmissions
06-04-2024 10:32
240406-mk6gpagc4y 1006-04-2024 10:23
240406-me8pvsgg43 1006-04-2024 10:20
240406-mdjz4sgf86 10Analysis
-
max time kernel
16s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 10:32
Static task
static1
1 signatures
General
-
Target
e251129e83d32c1744bce1cbc8018c03_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
e251129e83d32c1744bce1cbc8018c03
-
SHA1
75f3bff3c62f3a1c3b68bf0e88b9d441a03b999d
-
SHA256
f544d908dca93097fdf1f99a4f697783f6aedd5f575df7408669f489771708b5
-
SHA512
806cc52f2f2fcd7618f6ca12251ef7c3d3b708820b01d96d69c7c953541c3622e633278f5215669bb0c3b10b623cdf8321893f1b6c8e20089bd307a44f5c6a65
-
SSDEEP
24576:NvU/JLZY+IROxI5+5TsiPutQSmV11hfUSbZmyc9VCKTwaRhP8IGaHQrs8t:C/JXT5TsioQSmV11hcSFmyOVCKTwaRud
Malware Config
Signatures
-
Detects Echelon Stealer payload 1 IoCs
resource yara_rule behavioral1/memory/2352-5-0x00000000004B0000-0x000000000064A000-memory.dmp family_echelon -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2352 e251129e83d32c1744bce1cbc8018c03_JaffaCakes118.exe 2352 e251129e83d32c1744bce1cbc8018c03_JaffaCakes118.exe