General

  • Target

    7d112da57ff6f5411b5281c4b4cda45c_JaffaCakes118

  • Size

    106KB

  • MD5

    7d112da57ff6f5411b5281c4b4cda45c

  • SHA1

    0d13bcd4656409bd10a48fcd5408d0bb10d7608c

  • SHA256

    8cc40c19153968eeee40ad9a21cc0264a9bba09e800f118160ad8f30db3d14f6

  • SHA512

    a3b34ed20c85fdf220f6fa807ffdd543c00384e96bcec0c4639d4a352684ec6b057f7058463c843e216b7acdb70026295374a8ac28687460bbcc0a98f27b1c52

  • SSDEEP

    3072:8QIURTXJehPjgg/7CELlqaJWabolOHjVEB1QM:8soSgeK0a8xlODV8r

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 6 IoCs

    Checks for missing Authenticode signature.

  • NSIS installer 2 IoCs

Files

  • 7d112da57ff6f5411b5281c4b4cda45c_JaffaCakes118
    .exe windows:4 windows x86 arch:x86

    099c0646ea7282d232219f8807883be0


    Headers

    Imports

    Sections

  • $PLUGINSDIR/FindProcDLL.dll
    .dll windows:5 windows x86 arch:x86

    3ed242cfa221f82a48383ccf2212450d


    Headers

    Imports

    Exports

    Sections

  • $PLUGINSDIR/System.dll
    .dll windows:5 windows x86 arch:x86

    aaa34d9251e34ceebd6bf5066471d799


    Headers

    Imports

    Exports

    Sections

  • $PLUGINSDIR/newadvsplash.dll
    .dll windows:4 windows x86 arch:x86

    2e363db44011ed76701ec6ce62db36f5


    Headers

    Imports

    Exports

    Sections

  • $PLUGINSDIR/splash.bmp
  • $TEMP/ERKeygen.exe
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • $TEMP/EasyRecovery.txt