General
-
Target
f14cfde4054c340f845dc94a40092bf2_JaffaCakes118
-
Size
1.1MB
-
Sample
240415-r16jvaba8w
-
MD5
f14cfde4054c340f845dc94a40092bf2
-
SHA1
d6e10af1081eaa0521b8dff0c3a387376d61ef4a
-
SHA256
5223dfd0625f9c0185149d5c96ea355822e3751c5e67d1eca48635314512930d
-
SHA512
77d41ee40dbb9d12892ada290b3732089dd2f8f8365362295639af6b926677d379da46a7620575ffe663c840c90c4226574c3665f502fadaa2d04a154840b5a4
-
SSDEEP
24576:FCOMrdnKc/00Tk5/PnZnoa/eHCWAs2d+P9uVci5sppJgo:YZZ/163KtHCf+YK
Static task
static1
Behavioral task
behavioral1
Sample
f14cfde4054c340f845dc94a40092bf2_JaffaCakes118.exe
Resource
win7-20240215-en
Malware Config
Extracted
danabot
4
192.119.110.73:443
192.236.147.159:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Targets
-
-
Target
f14cfde4054c340f845dc94a40092bf2_JaffaCakes118
-
Size
1.1MB
-
MD5
f14cfde4054c340f845dc94a40092bf2
-
SHA1
d6e10af1081eaa0521b8dff0c3a387376d61ef4a
-
SHA256
5223dfd0625f9c0185149d5c96ea355822e3751c5e67d1eca48635314512930d
-
SHA512
77d41ee40dbb9d12892ada290b3732089dd2f8f8365362295639af6b926677d379da46a7620575ffe663c840c90c4226574c3665f502fadaa2d04a154840b5a4
-
SSDEEP
24576:FCOMrdnKc/00Tk5/PnZnoa/eHCWAs2d+P9uVci5sppJgo:YZZ/163KtHCf+YK
-
Danabot Loader Component
-
Blocklisted process makes network request
-
Loads dropped DLL
-