General
-
Target
f20af1991721941a6712a07cfb2a81be_JaffaCakes118
-
Size
536KB
-
Sample
240415-139tqabg2x
-
MD5
f20af1991721941a6712a07cfb2a81be
-
SHA1
a134fcd514bb5cfbe9e98b9cfe28f3e02b9a28cf
-
SHA256
e36d3891436038b678aae50859a8bca3c50989deea07b8776c3927e76ad57c1d
-
SHA512
a8e248af9bcd8d427806d9ecc4e165ff34d0f8866f273e6b0bdd5bffcf1269a503880d94c6c3827ef762499899345405b13f6128c6d4eef8fdba6c7ef205480c
-
SSDEEP
12288:FRFZrKEx0B559K5mYneuZ3ot3Ufc1zg6o1HZmfFd:FHZFK3K5mYneuZ3Mv1zg6o1HEtd
Static task
static1
Behavioral task
behavioral1
Sample
f20af1991721941a6712a07cfb2a81be_JaffaCakes118.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f20af1991721941a6712a07cfb2a81be_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
f20af1991721941a6712a07cfb2a81be_JaffaCakes118
-
Size
536KB
-
MD5
f20af1991721941a6712a07cfb2a81be
-
SHA1
a134fcd514bb5cfbe9e98b9cfe28f3e02b9a28cf
-
SHA256
e36d3891436038b678aae50859a8bca3c50989deea07b8776c3927e76ad57c1d
-
SHA512
a8e248af9bcd8d427806d9ecc4e165ff34d0f8866f273e6b0bdd5bffcf1269a503880d94c6c3827ef762499899345405b13f6128c6d4eef8fdba6c7ef205480c
-
SSDEEP
12288:FRFZrKEx0B559K5mYneuZ3ot3Ufc1zg6o1HZmfFd:FHZFK3K5mYneuZ3Mv1zg6o1HEtd
Score10/10-
Bazar/Team9 Loader payload
-
Blocklisted process makes network request
-
Tries to connect to .bazar domain
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-