General
-
Target
f0a01e9dad4fb7ddf7634eacbc22b489_JaffaCakes118
-
Size
1.1MB
-
Sample
240415-jw61tacd7v
-
MD5
f0a01e9dad4fb7ddf7634eacbc22b489
-
SHA1
3271ca22e988712b0c5e0a3aab95674f9aa94ebf
-
SHA256
e19738a89a329be01099695a221c0d9885a728980cae42bed7625116469b4608
-
SHA512
51dc6e1fb63a2af1b9cc2685c1507ed22647ebbc216096e98d1d44b3431a7842cd5829265713a092673d7322ae8df4850e6e1bb85fb6120e81768ff325714deb
-
SSDEEP
24576:zAPM3/gzmS45PjeEZytUL3/xzxqNaJEqaWo:pIaSMrYUL3xxVill
Static task
static1
Behavioral task
behavioral1
Sample
f0a01e9dad4fb7ddf7634eacbc22b489_JaffaCakes118.exe
Resource
win7-20240319-en
Malware Config
Extracted
danabot
4
193.34.167.138:443
152.89.247.31:443
192.210.222.81:443
142.11.244.124:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
Targets
-
-
Target
f0a01e9dad4fb7ddf7634eacbc22b489_JaffaCakes118
-
Size
1.1MB
-
MD5
f0a01e9dad4fb7ddf7634eacbc22b489
-
SHA1
3271ca22e988712b0c5e0a3aab95674f9aa94ebf
-
SHA256
e19738a89a329be01099695a221c0d9885a728980cae42bed7625116469b4608
-
SHA512
51dc6e1fb63a2af1b9cc2685c1507ed22647ebbc216096e98d1d44b3431a7842cd5829265713a092673d7322ae8df4850e6e1bb85fb6120e81768ff325714deb
-
SSDEEP
24576:zAPM3/gzmS45PjeEZytUL3/xzxqNaJEqaWo:pIaSMrYUL3xxVill
-
Danabot Loader Component
-
Blocklisted process makes network request
-
Loads dropped DLL
-