General
-
Target
f206fcd4c9308dbd966384dc94ea6811_JaffaCakes118
-
Size
451KB
-
Sample
240415-1x4erahe74
-
MD5
f206fcd4c9308dbd966384dc94ea6811
-
SHA1
49e1c7affefcbdc4a69ce941704b63f0508760de
-
SHA256
301042d2e4c7c38c45d27312dffcd8260060bc8d98ddb510dbbf7f52f1f0f151
-
SHA512
efcce74dc0f7a326a54f7b7a999071236f92d1f0930630f10dbd070e4c3c4d4aef43dcaaa1d570ccb665f39490889529b4a87d73109f83f4477d60c9f2e49789
-
SSDEEP
6144:vuS/mbZR6tzw+HYzXfjn7FdXjxTpUQPY5e9JfQ3EIY0FY:XmbZRp+4pxxJY5cQ3EIYR
Static task
static1
Behavioral task
behavioral1
Sample
f206fcd4c9308dbd966384dc94ea6811_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f206fcd4c9308dbd966384dc94ea6811_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
f206fcd4c9308dbd966384dc94ea6811_JaffaCakes118
-
Size
451KB
-
MD5
f206fcd4c9308dbd966384dc94ea6811
-
SHA1
49e1c7affefcbdc4a69ce941704b63f0508760de
-
SHA256
301042d2e4c7c38c45d27312dffcd8260060bc8d98ddb510dbbf7f52f1f0f151
-
SHA512
efcce74dc0f7a326a54f7b7a999071236f92d1f0930630f10dbd070e4c3c4d4aef43dcaaa1d570ccb665f39490889529b4a87d73109f83f4477d60c9f2e49789
-
SSDEEP
6144:vuS/mbZR6tzw+HYzXfjn7FdXjxTpUQPY5e9JfQ3EIY0FY:XmbZRp+4pxxJY5cQ3EIYR
Score10/10-
Detect ZGRat V1
-
WSHRAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-