General
-
Target
f359895c51e61de1170ea9e6441a36e5_JaffaCakes118
-
Size
1.0MB
-
Sample
240416-m31n6agf93
-
MD5
f359895c51e61de1170ea9e6441a36e5
-
SHA1
b994387bf15003efcf8aa578d28622da91e93860
-
SHA256
df03220ee207a1be64e9f25b74a78684ecd00fd75dd3e44e38e2b1678060e8be
-
SHA512
d050a77d797582ae99f2456e029b841a666b5fd77560ecf192dc35782543f66c227b52a8bed8e505e26de0ce2f73410827957eca6260d556a0bab9c6cbc0fe75
-
SSDEEP
24576:18Wemq6coWBkURMJpMeghq9mYjaDaPdqpvK1:18W3q6NUR+ZghQROaFqpv
Static task
static1
Behavioral task
behavioral1
Sample
f359895c51e61de1170ea9e6441a36e5_JaffaCakes118.exe
Resource
win7-20240319-en
Malware Config
Extracted
danabot
4
23.229.29.48:443
5.9.224.204:443
192.210.222.81:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
Targets
-
-
Target
f359895c51e61de1170ea9e6441a36e5_JaffaCakes118
-
Size
1.0MB
-
MD5
f359895c51e61de1170ea9e6441a36e5
-
SHA1
b994387bf15003efcf8aa578d28622da91e93860
-
SHA256
df03220ee207a1be64e9f25b74a78684ecd00fd75dd3e44e38e2b1678060e8be
-
SHA512
d050a77d797582ae99f2456e029b841a666b5fd77560ecf192dc35782543f66c227b52a8bed8e505e26de0ce2f73410827957eca6260d556a0bab9c6cbc0fe75
-
SSDEEP
24576:18Wemq6coWBkURMJpMeghq9mYjaDaPdqpvK1:18W3q6NUR+ZghQROaFqpv
-
Danabot Loader Component
-
Blocklisted process makes network request
-
Loads dropped DLL
-