General
-
Target
eaa4804cf595abd23c4343178368c9d9_JaffaCakes118
-
Size
2.3MB
-
Sample
240410-j8zghahc68
-
MD5
eaa4804cf595abd23c4343178368c9d9
-
SHA1
6d6af8927b47253c93e5a6f82857fa1616726cd0
-
SHA256
a46c6633047d02e9068788cf0305cc96cdd75725a9742d1cca990ebdb4f41d07
-
SHA512
affc8f30e894b170f54d7fd15479ca6d57869d33cf6ee50b3f8d74241674c5721a61ba78e454f87664feffb2ae1b34c4b43a64e6e4d836439283af84ceb8250b
-
SSDEEP
49152:9mfXbxiXPa3+waGrmuwo2jGKeg5Ej3D9bKcDPYloUo:0XbxyPaR2jG/cEjT4S
Static task
static1
Behavioral task
behavioral1
Sample
eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
eaa4804cf595abd23c4343178368c9d9_JaffaCakes118
-
Size
2.3MB
-
MD5
eaa4804cf595abd23c4343178368c9d9
-
SHA1
6d6af8927b47253c93e5a6f82857fa1616726cd0
-
SHA256
a46c6633047d02e9068788cf0305cc96cdd75725a9742d1cca990ebdb4f41d07
-
SHA512
affc8f30e894b170f54d7fd15479ca6d57869d33cf6ee50b3f8d74241674c5721a61ba78e454f87664feffb2ae1b34c4b43a64e6e4d836439283af84ceb8250b
-
SSDEEP
49152:9mfXbxiXPa3+waGrmuwo2jGKeg5Ej3D9bKcDPYloUo:0XbxyPaR2jG/cEjT4S
-
Detect ZGRat V1
-
Detects Echelon Stealer payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-