General
-
Target
701820afc26b023402b5869eb9a2c832_JaffaCakes118
-
Size
4.1MB
-
Sample
240524-23z5ysed5t
-
MD5
701820afc26b023402b5869eb9a2c832
-
SHA1
d3741e6728b248dc2786ce7740034ce3c23996ef
-
SHA256
1e83ae1550dd4795e067e873514fa1a6f31881be3cb23adf6f5b93f37d50d8c2
-
SHA512
872e053e127f503f1376375e82b680680d4508d6468038a5e212d1198ba1cb44aa0f97b46a864eaaeb9b1baae8f7c004229c6560619e586fd999618524edc4c1
-
SSDEEP
98304:U3iwcOgL8+O0J6UMoWFhygoWbsbXqFEYbmSv8:Uy7TJ6CWPyg8baE4
Behavioral task
behavioral1
Sample
701820afc26b023402b5869eb9a2c832_JaffaCakes118.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
701820afc26b023402b5869eb9a2c832_JaffaCakes118
-
Size
4.1MB
-
MD5
701820afc26b023402b5869eb9a2c832
-
SHA1
d3741e6728b248dc2786ce7740034ce3c23996ef
-
SHA256
1e83ae1550dd4795e067e873514fa1a6f31881be3cb23adf6f5b93f37d50d8c2
-
SHA512
872e053e127f503f1376375e82b680680d4508d6468038a5e212d1198ba1cb44aa0f97b46a864eaaeb9b1baae8f7c004229c6560619e586fd999618524edc4c1
-
SSDEEP
98304:U3iwcOgL8+O0J6UMoWFhygoWbsbXqFEYbmSv8:Uy7TJ6CWPyg8baE4
-
Detect Fabookie payload
-
Nirsoft
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-