General
-
Target
802ed979f87910a1d9c7493ce7cfc690_JaffaCakes118
-
Size
125KB
-
Sample
240529-kxbrqshd5s
-
MD5
802ed979f87910a1d9c7493ce7cfc690
-
SHA1
f06a3a95a275e11323f4275b1bff022203e1fb6c
-
SHA256
db3f80caa491ddc056bbdb05460b7724f3bae399540639a2e59781b8b70e8c66
-
SHA512
bdb2c148148a7f5fa67c78991bb8bc80533e2f75566ac006a1d21c2421983122d5a079272548e6a49629e337af59ad1a5e8b47927b57ed67ebf6069609a74ab0
-
SSDEEP
3072:7aao7GsC4XJG2qAeMDm40TXFA9lM2zwuP/1cx3WtaJIw:GdaoXJGZAeMD2XIw2tcx3VH
Static task
static1
Behavioral task
behavioral1
Sample
yDcxq786278.kreC3.msi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
yDcxq786278.kreC3.msi
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
yDcxq786278.kreC3.msi
-
Size
266KB
-
MD5
e71cc989bfc69243f0d6caf7f4047c14
-
SHA1
b943c74d8e0795f621a0e36859f70c55247ed4c7
-
SHA256
7550cf136871b8a90ae089c3059806fa1f9e5189dadf2aa85fd035aee2ae378b
-
SHA512
ffdc744c182bb9ce54f4c39c803e91782f06a35fe112080e9977de712007322b993f70dd6d7b84890c7095cbb90649ea649afcd9e2ac9a717d8cd5ef469ecaf5
-
SSDEEP
3072:m9eygYXkj7q0vTYDryO1nx/wDcU6ij4qpXqnnDibAJBVk39uY5Ag3DpG7:m9oiiDcTqp4nwEFY5Ag3D
Score6/10-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-