General
-
Target
109e409332dd0856d2ae2fbc32da86cb_JaffaCakes118
-
Size
73KB
-
Sample
240503-qjbsgagb8z
-
MD5
109e409332dd0856d2ae2fbc32da86cb
-
SHA1
1b15d4bc7df1a6d68bc41156e980fc0426eced84
-
SHA256
2e107f8ba1f0c634aeee39cd158629a23ea32285fd9da6fe936d637a4cdb0370
-
SHA512
07c131b6917af831cecc9aa5e554a9c053947b5d81f5d742b5a470acaee673740faa291e42b54f0677d5d7092f87cdbd5cb38900d13ef756d44000789b0b7e39
-
SSDEEP
1536:L55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:3MSjOnrmBTMqqDL2/mr3IdE8we0Avu5h
Behavioral task
behavioral1
Sample
109e409332dd0856d2ae2fbc32da86cb_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
109e409332dd0856d2ae2fbc32da86cb_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Targets
-
-
Target
109e409332dd0856d2ae2fbc32da86cb_JaffaCakes118
-
Size
73KB
-
MD5
109e409332dd0856d2ae2fbc32da86cb
-
SHA1
1b15d4bc7df1a6d68bc41156e980fc0426eced84
-
SHA256
2e107f8ba1f0c634aeee39cd158629a23ea32285fd9da6fe936d637a4cdb0370
-
SHA512
07c131b6917af831cecc9aa5e554a9c053947b5d81f5d742b5a470acaee673740faa291e42b54f0677d5d7092f87cdbd5cb38900d13ef756d44000789b0b7e39
-
SSDEEP
1536:L55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:3MSjOnrmBTMqqDL2/mr3IdE8we0Avu5h
Score6/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-