General
-
Target
e476a9b5d996a26fea7435e9a84d2177_JaffaCakes118
-
Size
1.3MB
-
Sample
240407-j17g5sha72
-
MD5
e476a9b5d996a26fea7435e9a84d2177
-
SHA1
e29ff0b1dcce3ee52d66b951c6e5512b2b95141c
-
SHA256
d2a6216f8222981c57145891441d757286e945977e20df57fa6f83bbbe4f799c
-
SHA512
158c08381f7ecb5363c02a2e665386c5bd9b765af9a0d82f2babfe04e86e64fad7b8a8e60c95c8080edaf4014214a81f05b96977e927d8b57ae73aef206c9dd0
-
SSDEEP
24576:h8pWEmpmXXwr8gxKmuasnXbWeLy4j61ehNTmnxfC:ChHaoWeN6iTmxf
Behavioral task
behavioral1
Sample
e476a9b5d996a26fea7435e9a84d2177_JaffaCakes118.dll
Resource
win7-20240221-en
Malware Config
Extracted
danabot
4
23.229.29.48:443
192.210.222.81:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
Targets
-
-
Target
e476a9b5d996a26fea7435e9a84d2177_JaffaCakes118
-
Size
1.3MB
-
MD5
e476a9b5d996a26fea7435e9a84d2177
-
SHA1
e29ff0b1dcce3ee52d66b951c6e5512b2b95141c
-
SHA256
d2a6216f8222981c57145891441d757286e945977e20df57fa6f83bbbe4f799c
-
SHA512
158c08381f7ecb5363c02a2e665386c5bd9b765af9a0d82f2babfe04e86e64fad7b8a8e60c95c8080edaf4014214a81f05b96977e927d8b57ae73aef206c9dd0
-
SSDEEP
24576:h8pWEmpmXXwr8gxKmuasnXbWeLy4j61ehNTmnxfC:ChHaoWeN6iTmxf
-
Danabot Loader Component
-
Blocklisted process makes network request
-