General
-
Target
1678b9d5bbe12efea1dbdcada72d706f_JaffaCakes118
-
Size
4.2MB
-
Sample
240505-hkzlxsac6w
-
MD5
1678b9d5bbe12efea1dbdcada72d706f
-
SHA1
f794a2ec9f20cee25dd9c0a05cfba992d63fb9f7
-
SHA256
409cf4e571629858bc3e755ad0fc63c0f484d9ee3395bf6bf19f5b2ba0537934
-
SHA512
253db53adcd7675bcc67a32ee718f8d88477634fd8647c54a158fa90246334ffdaa8f471c3c2320dfd1b24e070b91d2ff9e1eae0e51e74748347019e7e917022
-
SSDEEP
98304:LW+hMSakOi/77CHohdHSia4HeOZ4BqzlVsOgJLhdy:LW++Hpia4tZ4
Behavioral task
behavioral1
Sample
1678b9d5bbe12efea1dbdcada72d706f_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
1678b9d5bbe12efea1dbdcada72d706f_JaffaCakes118
-
Size
4.2MB
-
MD5
1678b9d5bbe12efea1dbdcada72d706f
-
SHA1
f794a2ec9f20cee25dd9c0a05cfba992d63fb9f7
-
SHA256
409cf4e571629858bc3e755ad0fc63c0f484d9ee3395bf6bf19f5b2ba0537934
-
SHA512
253db53adcd7675bcc67a32ee718f8d88477634fd8647c54a158fa90246334ffdaa8f471c3c2320dfd1b24e070b91d2ff9e1eae0e51e74748347019e7e917022
-
SSDEEP
98304:LW+hMSakOi/77CHohdHSia4HeOZ4BqzlVsOgJLhdy:LW++Hpia4tZ4
-
Detect Fabookie payload
-
Nirsoft
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-