General
-
Target
16a2eae1a9a0d36c8b11f2464960032d_JaffaCakes118
-
Size
21KB
-
Sample
240627-tkhtysygkg
-
MD5
16a2eae1a9a0d36c8b11f2464960032d
-
SHA1
7b5aaacd9adadb03f0a79ab0a6eccc49178df228
-
SHA256
f9763c9be7f4bf24fa12f85741a843d8c44c1e80ad2d9332e69c34fc121b90fc
-
SHA512
224cb497cfa9b3a14ccc82decdd9ccccaf0b1b9ac0b37d2c01f02518b9f755d00d484825312d449dc023a85edd2fe28fe3e18940dc0c115f48b8539bbf505722
-
SSDEEP
384:LomKRSeLRAyMNRZQWa9DrkKwx72H2xSGjY6j365fVr4HR9AauKedDdc:LobLRAyGUDgKwxCWks3gtUHx
Static task
static1
Behavioral task
behavioral1
Sample
16a2eae1a9a0d36c8b11f2464960032d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16a2eae1a9a0d36c8b11f2464960032d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
Protocol: ftp- Host:
parapadada.aiq.ru - Port:
21 - Username:
u405331 - Password:
2uwbi2of
Targets
-
-
Target
16a2eae1a9a0d36c8b11f2464960032d_JaffaCakes118
-
Size
21KB
-
MD5
16a2eae1a9a0d36c8b11f2464960032d
-
SHA1
7b5aaacd9adadb03f0a79ab0a6eccc49178df228
-
SHA256
f9763c9be7f4bf24fa12f85741a843d8c44c1e80ad2d9332e69c34fc121b90fc
-
SHA512
224cb497cfa9b3a14ccc82decdd9ccccaf0b1b9ac0b37d2c01f02518b9f755d00d484825312d449dc023a85edd2fe28fe3e18940dc0c115f48b8539bbf505722
-
SSDEEP
384:LomKRSeLRAyMNRZQWa9DrkKwx72H2xSGjY6j365fVr4HR9AauKedDdc:LobLRAyGUDgKwxCWks3gtUHx
Score10/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-