General
-
Target
1cbb1d0d8f45beadd900c675d2f0e50d_JaffaCakes118
-
Size
1.6MB
-
Sample
240506-qvdq7sdb2z
-
MD5
1cbb1d0d8f45beadd900c675d2f0e50d
-
SHA1
d3d999f198e8b009674c9db2e14de493ef9c61d9
-
SHA256
246fe8f669f674ed1170cbba901fa5609c693b09e4e60bebd54ba07f5a80d035
-
SHA512
58f0e6b7684d9d6e41dbce5a4bf30e58119bb63cfb3a2636e4aa8161551313aceb16c38f700407ad6e7b090e6dd693bb2b344fe1f6414a8a74275308fb736329
-
SSDEEP
24576:u4rL+iTBObcQo/8jfFJsJipr2IvskGhPUqf6uCrh9pS9v+Ck7Ow+EVIq8KOd:zLDTylbTq2skS8gRQzmm9qNEG
Behavioral task
behavioral1
Sample
1cbb1d0d8f45beadd900c675d2f0e50d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1cbb1d0d8f45beadd900c675d2f0e50d_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
raccoon
ca50de89aeb57a98ef3c6469ed2d76b33aee5eec
-
url4cnc
https://telete.in/jrubixred
Targets
-
-
Target
1cbb1d0d8f45beadd900c675d2f0e50d_JaffaCakes118
-
Size
1.6MB
-
MD5
1cbb1d0d8f45beadd900c675d2f0e50d
-
SHA1
d3d999f198e8b009674c9db2e14de493ef9c61d9
-
SHA256
246fe8f669f674ed1170cbba901fa5609c693b09e4e60bebd54ba07f5a80d035
-
SHA512
58f0e6b7684d9d6e41dbce5a4bf30e58119bb63cfb3a2636e4aa8161551313aceb16c38f700407ad6e7b090e6dd693bb2b344fe1f6414a8a74275308fb736329
-
SSDEEP
24576:u4rL+iTBObcQo/8jfFJsJipr2IvskGhPUqf6uCrh9pS9v+Ck7Ow+EVIq8KOd:zLDTylbTq2skS8gRQzmm9qNEG
-
Detect ZGRat V1
-
Raccoon Stealer V1 payload
-
Suspicious use of SetThreadContext
-