General
-
Target
92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118
-
Size
1.8MB
-
Sample
240603-vcz9pscg8y
-
MD5
92821d6dd83105f5f2d08c43f28fa309
-
SHA1
93c72e2494705509b56ca93cea2448aff098cb6d
-
SHA256
dc3171271adef72e1faf51d68c3c76daaffa9f097ef6d51aa600c98f129209e8
-
SHA512
47c3a27b5a9fa6273d779ed8afffeb2bbbecab6420708f0ca36629932e1d910e06297839ca39ec01fe7e975a52ed12aaa0e781f5112870e1b7621722e1808c08
-
SSDEEP
24576:rs50Mmi16DJ14W3a+sGbSeEs50MaRfgLA5TmOKKs50MA2iQZLAdTmOKYLA9TmOKh:rs51AJ1/ks58fgCCKs5A2XaCYKCh
Static task
static1
Behavioral task
behavioral1
Sample
92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Extracted
raccoon
cf43f57ef5d1c064538f5f9d27891dc66c96dad8
-
url4cnc
https://telete.in/brikitiki
Extracted
oski
nadia.ac.ug
Targets
-
-
Target
92821d6dd83105f5f2d08c43f28fa309_JaffaCakes118
-
Size
1.8MB
-
MD5
92821d6dd83105f5f2d08c43f28fa309
-
SHA1
93c72e2494705509b56ca93cea2448aff098cb6d
-
SHA256
dc3171271adef72e1faf51d68c3c76daaffa9f097ef6d51aa600c98f129209e8
-
SHA512
47c3a27b5a9fa6273d779ed8afffeb2bbbecab6420708f0ca36629932e1d910e06297839ca39ec01fe7e975a52ed12aaa0e781f5112870e1b7621722e1808c08
-
SSDEEP
24576:rs50Mmi16DJ14W3a+sGbSeEs50MaRfgLA5TmOKKs50MA2iQZLAdTmOKYLA9TmOKh:rs51AJ1/ks58fgCCKs5A2XaCYKCh
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Raccoon Stealer V1 payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-