General
-
Target
e6b7419ef5704c67f35d42beeeba83ba_JaffaCakes118
-
Size
1.1MB
-
Sample
240408-fztccahf7y
-
MD5
e6b7419ef5704c67f35d42beeeba83ba
-
SHA1
feedc1394fa98c479c41fc1211c530f3201fde06
-
SHA256
7a79e2248392fa193b734c9442588144434853006dd6b54545ab3e4ef7971cba
-
SHA512
0807f5e4691cddb6a44c4f231a084857919a223c98fee3f7441f9be35e9eab6597077114eff067508c9b615aed006a155ac6a124d44fc436a52ec770d040a0b1
-
SSDEEP
24576:sV0ZPpGUWXqpnYHSFl/zXhe9HSOUok699n5E7W/LcEBPA:iuQJXhHEl/zGjfk6992WwEBI
Static task
static1
Behavioral task
behavioral1
Sample
e6b7419ef5704c67f35d42beeeba83ba_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
danabot
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
Targets
-
-
Target
e6b7419ef5704c67f35d42beeeba83ba_JaffaCakes118
-
Size
1.1MB
-
MD5
e6b7419ef5704c67f35d42beeeba83ba
-
SHA1
feedc1394fa98c479c41fc1211c530f3201fde06
-
SHA256
7a79e2248392fa193b734c9442588144434853006dd6b54545ab3e4ef7971cba
-
SHA512
0807f5e4691cddb6a44c4f231a084857919a223c98fee3f7441f9be35e9eab6597077114eff067508c9b615aed006a155ac6a124d44fc436a52ec770d040a0b1
-
SSDEEP
24576:sV0ZPpGUWXqpnYHSFl/zXhe9HSOUok699n5E7W/LcEBPA:iuQJXhHEl/zGjfk6992WwEBI
-
Danabot Loader Component
-
Blocklisted process makes network request
-
Loads dropped DLL
-