General
-
Target
3ae5d683f6ac3b8e94046b04c87927de_JaffaCakes118
-
Size
74KB
-
Sample
240512-tbv3xsgb73
-
MD5
3ae5d683f6ac3b8e94046b04c87927de
-
SHA1
ace802d67421aabcf9ba3ba21632468f0265a2e2
-
SHA256
c439374dede22f38738d6c955764542c1528956c4d4b773a4dec12a4f34dba44
-
SHA512
ad3ba4ef0d4940b397d759edda1c45cffdeb1d684e04c787ba0be34dfd38e23ce375e4256237b33ec485f7f9b909277b3f6fd9e93d450087a31251abb164f7e3
-
SSDEEP
1536:dScQPMz4GlHNvQYviFSD17fdN85bxYYhVfGAGnNUHORWR:ccQPM8GdNv6ERYLN7SNEKWR
Static task
static1
Behavioral task
behavioral1
Sample
3ae5d683f6ac3b8e94046b04c87927de_JaffaCakes118.js
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3ae5d683f6ac3b8e94046b04c87927de_JaffaCakes118.js
Resource
win10v2004-20240508-en
Malware Config
Extracted
wshrat
http://freehost222.ddns.net:1555
Targets
-
-
Target
3ae5d683f6ac3b8e94046b04c87927de_JaffaCakes118
-
Size
74KB
-
MD5
3ae5d683f6ac3b8e94046b04c87927de
-
SHA1
ace802d67421aabcf9ba3ba21632468f0265a2e2
-
SHA256
c439374dede22f38738d6c955764542c1528956c4d4b773a4dec12a4f34dba44
-
SHA512
ad3ba4ef0d4940b397d759edda1c45cffdeb1d684e04c787ba0be34dfd38e23ce375e4256237b33ec485f7f9b909277b3f6fd9e93d450087a31251abb164f7e3
-
SSDEEP
1536:dScQPMz4GlHNvQYviFSD17fdN85bxYYhVfGAGnNUHORWR:ccQPM8GdNv6ERYLN7SNEKWR
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-