General
-
Target
1fa8859a60ac751d2f902ba0ba4f7f8d_JaffaCakes118
-
Size
1.9MB
-
Sample
240507-gmmjpsfa44
-
MD5
1fa8859a60ac751d2f902ba0ba4f7f8d
-
SHA1
71ecc132df74adf48989f6074d505120f3af7b60
-
SHA256
79abefa5e6692a3096c000815a138d47c43d361b93ff73c2b13a1c8b77321543
-
SHA512
3452de68d6022daa980f9f82f918107e6d7c28d8d8cf5bb96b66917485d9e6d702fe44f91bd2fa8fc09097201cf927bb2ab71482759bca59b2660fff7ce1e598
-
SSDEEP
24576:BKQruemcQ8gZaiZF3xLUGWyWrPwBAOc1sz7LDOjLO/r30/gRo3zDuvxeS7U:wQg3jcwBhuIj0oRXV4
Static task
static1
Behavioral task
behavioral1
Sample
1fa8859a60ac751d2f902ba0ba4f7f8d_JaffaCakes118.ps1
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1fa8859a60ac751d2f902ba0ba4f7f8d_JaffaCakes118.ps1
Resource
win10v2004-20240419-en
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Extracted
oski
tomasisa.ug
Extracted
raccoon
089d42bf776aba2e6326c9c557e433da6c3501f4
-
url4cnc
https://telete.in/jrikitiki
Targets
-
-
Target
1fa8859a60ac751d2f902ba0ba4f7f8d_JaffaCakes118
-
Size
1.9MB
-
MD5
1fa8859a60ac751d2f902ba0ba4f7f8d
-
SHA1
71ecc132df74adf48989f6074d505120f3af7b60
-
SHA256
79abefa5e6692a3096c000815a138d47c43d361b93ff73c2b13a1c8b77321543
-
SHA512
3452de68d6022daa980f9f82f918107e6d7c28d8d8cf5bb96b66917485d9e6d702fe44f91bd2fa8fc09097201cf927bb2ab71482759bca59b2660fff7ce1e598
-
SSDEEP
24576:BKQruemcQ8gZaiZF3xLUGWyWrPwBAOc1sz7LDOjLO/r30/gRo3zDuvxeS7U:wQg3jcwBhuIj0oRXV4
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Raccoon Stealer V1 payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-