General
-
Target
fb90aa2e50efba5fcba39ceffe69633e_JaffaCakes118
-
Size
2.1MB
-
Sample
240420-bcg9cacb33
-
MD5
fb90aa2e50efba5fcba39ceffe69633e
-
SHA1
66d3b5d93f7b5638342bb81e43861f4d7292d2df
-
SHA256
b5dda0bddbb6438b46a2097787f26f2cceed8696c6147b44265bc38463b71311
-
SHA512
41c8fc9d0d0af0938275b7b970e03bf3436eecced8bf4961b85c4d95b00f58854262ee34493a55c801e1668ade433499039ed7e9a6511d5db9238e92f3cf07ba
-
SSDEEP
49152:yKCyQ9XtjBXegJ+ugbfXjRSGehRSHwANMQEm5V3wXn:CZ99FrgbfjRSG4gHwsxEm5an
Static task
static1
Behavioral task
behavioral1
Sample
fb90aa2e50efba5fcba39ceffe69633e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb90aa2e50efba5fcba39ceffe69633e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
bitrat
1.38
con.microgent.ru:6992
-
communication_password
760d1a76fde860fea97ca75974d2a4d1
-
tor_process
tor
Targets
-
-
Target
fb90aa2e50efba5fcba39ceffe69633e_JaffaCakes118
-
Size
2.1MB
-
MD5
fb90aa2e50efba5fcba39ceffe69633e
-
SHA1
66d3b5d93f7b5638342bb81e43861f4d7292d2df
-
SHA256
b5dda0bddbb6438b46a2097787f26f2cceed8696c6147b44265bc38463b71311
-
SHA512
41c8fc9d0d0af0938275b7b970e03bf3436eecced8bf4961b85c4d95b00f58854262ee34493a55c801e1668ade433499039ed7e9a6511d5db9238e92f3cf07ba
-
SSDEEP
49152:yKCyQ9XtjBXegJ+ugbfXjRSGehRSHwANMQEm5V3wXn:CZ99FrgbfjRSG4gHwsxEm5an
Score10/10-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-