General
-
Target
3718fe99f772c81aa908369cd7279eac_JaffaCakes118
-
Size
170KB
-
Sample
240511-3ff91agg64
-
MD5
3718fe99f772c81aa908369cd7279eac
-
SHA1
34f02fba4e619d718b69bec2152a75683fa6a3c8
-
SHA256
c4f3e1c36ef734927967d40bba87fc620abe5c5049b0e67fd3cc3dab9c763c7a
-
SHA512
a86468e74665e1b26cb3233a84e4eae4c950b7c6ab24bd680c0da836cb8691eeae6b92dd8c603c1e03fcfc1c9c11f8a277b99a1d0d0b5e188ea03db4fc68df2c
-
SSDEEP
3072:REOpmT46vL0hxtHlGAJyezW+iVu8FsVWswU5rp4h:RiTvvAhfAAJrriVdsVWGI
Behavioral task
behavioral1
Sample
3718fe99f772c81aa908369cd7279eac_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3718fe99f772c81aa908369cd7279eac_JaffaCakes118.dll
Resource
win10v2004-20240426-en
Malware Config
Extracted
zloader
goldhub
18.03.2020
https://105711.com/docs.php
https://209711.com/process.php
https://106311.com/comegetsome.php
https://124331.com/success.php
-
build_id
31
Targets
-
-
Target
3718fe99f772c81aa908369cd7279eac_JaffaCakes118
-
Size
170KB
-
MD5
3718fe99f772c81aa908369cd7279eac
-
SHA1
34f02fba4e619d718b69bec2152a75683fa6a3c8
-
SHA256
c4f3e1c36ef734927967d40bba87fc620abe5c5049b0e67fd3cc3dab9c763c7a
-
SHA512
a86468e74665e1b26cb3233a84e4eae4c950b7c6ab24bd680c0da836cb8691eeae6b92dd8c603c1e03fcfc1c9c11f8a277b99a1d0d0b5e188ea03db4fc68df2c
-
SSDEEP
3072:REOpmT46vL0hxtHlGAJyezW+iVu8FsVWswU5rp4h:RiTvvAhfAAJrriVdsVWGI
Score10/10-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-