General
-
Target
138dd6f0c549b0e7facab17d5da7833a_JaffaCakes118
-
Size
4.1MB
-
Sample
240504-tyzpmabb8t
-
MD5
138dd6f0c549b0e7facab17d5da7833a
-
SHA1
0874bbfb1316308533e6b243766480d3fa7af9d4
-
SHA256
f3635ffdfa0773be8da45f4bbcc25a2b962f92f62ee03de853d9feac0c3dc277
-
SHA512
160889bfb723fb94c35e86ea159383f4e4e4e09c8f373bc887eee3d38f48007d86888c9d0ce29a0a0f84cd20e30784591888acff450884c60f4ec71db741f49c
-
SSDEEP
98304:sOgxAmHCpxpfKYBHKOJx2nn5NkO3vfPw/fm1hf+t:NmHYxFBqI2nn5NkO3uuhf
Behavioral task
behavioral1
Sample
138dd6f0c549b0e7facab17d5da7833a_JaffaCakes118.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
138dd6f0c549b0e7facab17d5da7833a_JaffaCakes118
-
Size
4.1MB
-
MD5
138dd6f0c549b0e7facab17d5da7833a
-
SHA1
0874bbfb1316308533e6b243766480d3fa7af9d4
-
SHA256
f3635ffdfa0773be8da45f4bbcc25a2b962f92f62ee03de853d9feac0c3dc277
-
SHA512
160889bfb723fb94c35e86ea159383f4e4e4e09c8f373bc887eee3d38f48007d86888c9d0ce29a0a0f84cd20e30784591888acff450884c60f4ec71db741f49c
-
SSDEEP
98304:sOgxAmHCpxpfKYBHKOJx2nn5NkO3vfPw/fm1hf+t:NmHYxFBqI2nn5NkO3uuhf
-
Detect Fabookie payload
-
Nirsoft
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-