General
-
Target
8bfc072d37f41190515f8dc00a59fb2e_JaffaCakes118
-
Size
2.5MB
-
Sample
240601-19exxsgf5w
-
MD5
8bfc072d37f41190515f8dc00a59fb2e
-
SHA1
2d9600a0697de84522b4e65d9be02b9ed9352b4d
-
SHA256
35e45d556443c8bf4498d8968ab2a79e751fc2d359bf9f6b4dfd86d417f17cfb
-
SHA512
746da073a5f89370238d1b6268c16730edbced02afacd9663a30042be9cc41780d6a0e0edfebddfac5f4bb2d7f46edb801efe40d03d688dde33f3c792039f149
-
SSDEEP
49152:vVCtClGueBQxAwYn0BJNs7CD9d8nyB+xZkl1NNbE7vWdM:NCGGhfRn0BJNs7++yBUZkTXwLWO
Behavioral task
behavioral1
Sample
8bfc072d37f41190515f8dc00a59fb2e_JaffaCakes118
Resource
ubuntu2004-amd64-20240508-en
Malware Config
Targets
-
-
Target
8bfc072d37f41190515f8dc00a59fb2e_JaffaCakes118
-
Size
2.5MB
-
MD5
8bfc072d37f41190515f8dc00a59fb2e
-
SHA1
2d9600a0697de84522b4e65d9be02b9ed9352b4d
-
SHA256
35e45d556443c8bf4498d8968ab2a79e751fc2d359bf9f6b4dfd86d417f17cfb
-
SHA512
746da073a5f89370238d1b6268c16730edbced02afacd9663a30042be9cc41780d6a0e0edfebddfac5f4bb2d7f46edb801efe40d03d688dde33f3c792039f149
-
SSDEEP
49152:vVCtClGueBQxAwYn0BJNs7CD9d8nyB+xZkl1NNbE7vWdM:NCGGhfRn0BJNs7++yBUZkTXwLWO
Score6/10-
Checks hardware identifiers (DMI)
Checks DMI information which indicate if the system is a virtual machine.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads hardware information
Accesses system info like serial numbers, manufacturer names etc.
-