General
-
Target
ea8e82682b84deaedb726cffdff9bb26_JaffaCakes118
-
Size
1.3MB
-
Sample
240410-jcdj6abb3x
-
MD5
ea8e82682b84deaedb726cffdff9bb26
-
SHA1
1c11290f354c8c38a0dc61f4b433b116707fcfc5
-
SHA256
0e6cf49bee4ac77003506be7aff676b97f1bf9085bbaada2b7e2ae086db51685
-
SHA512
128fe0a7f24dc020fb137659c545f4e14e54add5544259fdacb3d7407e85a34b89672a0b763a27d715d2bbc90768c1f1e53818db1cb76759c22a22b631e73617
-
SSDEEP
24576:78pWEmBDGwiFYSM8dILlgQatAoXkyRGA2TUFQ:gSiWmlXHRX2T
Behavioral task
behavioral1
Sample
ea8e82682b84deaedb726cffdff9bb26_JaffaCakes118.dll
Resource
win7-20240221-en
Malware Config
Extracted
danabot
4
23.229.29.48:443
5.9.224.204:443
192.210.222.81:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
Targets
-
-
Target
ea8e82682b84deaedb726cffdff9bb26_JaffaCakes118
-
Size
1.3MB
-
MD5
ea8e82682b84deaedb726cffdff9bb26
-
SHA1
1c11290f354c8c38a0dc61f4b433b116707fcfc5
-
SHA256
0e6cf49bee4ac77003506be7aff676b97f1bf9085bbaada2b7e2ae086db51685
-
SHA512
128fe0a7f24dc020fb137659c545f4e14e54add5544259fdacb3d7407e85a34b89672a0b763a27d715d2bbc90768c1f1e53818db1cb76759c22a22b631e73617
-
SSDEEP
24576:78pWEmBDGwiFYSM8dILlgQatAoXkyRGA2TUFQ:gSiWmlXHRX2T
-
Danabot Loader Component
-
Blocklisted process makes network request
-