General
-
Target
0d88cf8de40612246c04de7dadb4dc56_JaffaCakes118
-
Size
800KB
-
Sample
240502-fcx21shb6z
-
MD5
0d88cf8de40612246c04de7dadb4dc56
-
SHA1
2ca8d4c46d13a84e16970fb55e17d6544cb51878
-
SHA256
2082c4f394b08d4bb03367395ec711487ee88fc8eed4a7d0eff97f0ad8ea7cee
-
SHA512
375f55741a08625031c3427066b906c663d36b99e760a059aa4a5f700d9976696690b8fb8b9fb2746091aceab4fdcdb951bf3f5a72e71e7ebce4f80152df84e4
-
SSDEEP
24576:G0xnF8LExZhh4Ze2fduGU58bVhXwnoN12dn1ixM2c7gF:G0xnF8LEfhh4kSdRU58woN1UnYxMB7
Static task
static1
Behavioral task
behavioral1
Sample
0d88cf8de40612246c04de7dadb4dc56_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0d88cf8de40612246c04de7dadb4dc56_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
raccoon
236c7f8a01d741b888dc6b6209805e66d41e62ba
-
url4cnc
https://telete.in/brikitiki
Extracted
oski
courtneysdv.ac.ug
Extracted
azorult
http://195.245.112.115/index.php
Targets
-
-
Target
0d88cf8de40612246c04de7dadb4dc56_JaffaCakes118
-
Size
800KB
-
MD5
0d88cf8de40612246c04de7dadb4dc56
-
SHA1
2ca8d4c46d13a84e16970fb55e17d6544cb51878
-
SHA256
2082c4f394b08d4bb03367395ec711487ee88fc8eed4a7d0eff97f0ad8ea7cee
-
SHA512
375f55741a08625031c3427066b906c663d36b99e760a059aa4a5f700d9976696690b8fb8b9fb2746091aceab4fdcdb951bf3f5a72e71e7ebce4f80152df84e4
-
SSDEEP
24576:G0xnF8LExZhh4Ze2fduGU58bVhXwnoN12dn1ixM2c7gF:G0xnF8LEfhh4kSdRU58woN1UnYxMB7
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Detect ZGRat V1
-
Raccoon Stealer V1 payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-