General
-
Target
639cb459c7bf64f47b7376a85b73a5b9_JaffaCakes118
-
Size
21KB
-
Sample
240521-rsj1waha87
-
MD5
639cb459c7bf64f47b7376a85b73a5b9
-
SHA1
c7cf7f964c0026c2cd8a4bdd2247812b4db388c6
-
SHA256
3fdc70759c5fb107d6eeb6b5be8fb50170e81ba1099dfa1ba30d6605d3264211
-
SHA512
a2f27af3eb258a78634dbb66f10b4eca9de7f85d7e1cb191589885eaaaa3da45780d42e578f8eb9700a2ab707f2155bb06ed4d374165b47b6caf956d4d83ca1c
-
SSDEEP
384:A78NZ1PxkVXx4fx95lxmsiZWPodaQ0Xma1UPsocQCsIkPfIuZ6QCj2JsiMiKENVe:bn553gUyaqPFrBIgQREjTTe
Static task
static1
Behavioral task
behavioral1
Sample
New PO as per attached-2020-6642.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
New PO as per attached-2020-6642.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
guloader
https://onedrive.live.com/download?cid=A32AEA2B4355716B&resid=A32AEA2B4355716B%214978&authkey=AI9mqOKtOkBDroM
Targets
-
-
Target
New PO as per attached-2020-6642.exe
-
Size
44KB
-
MD5
b17644b26f54aee17d39cb7bfceee846
-
SHA1
a6b0b1155257bbaf9d710fd8d9b92b94601d82d9
-
SHA256
6f840786f7756f4b7bd84cfc327477af8a3aa99ba9768581f52a7ba3df9af806
-
SHA512
bad64051fe0604f25630515ffa703304c153752664b846f1f90e8dc0d3bd3c426ccef8b169f013ba3d49dbaf4715be39ae3a0e8ff08ea6177427b22f459eeb93
-
SSDEEP
768:mVPH8IEd7Qs5a3V4IYRaacERTW3Mst3L:mVPcIm8Ua3GI9Xtb
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-