General
-
Target
3c3ec63f132d12f11f3d1f0ea9466e0e_JaffaCakes118
-
Size
2.3MB
-
Sample
240712-gvaj4steld
-
MD5
3c3ec63f132d12f11f3d1f0ea9466e0e
-
SHA1
514b9d7f1b76bd7cc93e3ca9ef7f42a77b264b91
-
SHA256
5502c0ca543e31cf1209de6e0903059a85b1d43fc052c94c80268748269a4012
-
SHA512
cca6e5b0c11ea804ebed96c81952802732150765b303650eb71eaf22fd70a3fb761712d5e5cb4c8c18eca9fdd557066cd23b257cac40dc1371c73e074fc2b4fe
-
SSDEEP
49152:/5dVwPaFHTTgkAAn2IQ39y9rRF83BhJF7gxl916Fy1xjK1e1:RdW4lQw5RF8Q
Static task
static1
Behavioral task
behavioral1
Sample
3c3ec63f132d12f11f3d1f0ea9466e0e_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
darkcomet
Guest16
rsthunder.zapto.org:1604
DC_MUTEX-TPZCEWL
-
gencode
fxq1KKnANCeE
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
3c3ec63f132d12f11f3d1f0ea9466e0e_JaffaCakes118
-
Size
2.3MB
-
MD5
3c3ec63f132d12f11f3d1f0ea9466e0e
-
SHA1
514b9d7f1b76bd7cc93e3ca9ef7f42a77b264b91
-
SHA256
5502c0ca543e31cf1209de6e0903059a85b1d43fc052c94c80268748269a4012
-
SHA512
cca6e5b0c11ea804ebed96c81952802732150765b303650eb71eaf22fd70a3fb761712d5e5cb4c8c18eca9fdd557066cd23b257cac40dc1371c73e074fc2b4fe
-
SSDEEP
49152:/5dVwPaFHTTgkAAn2IQ39y9rRF83BhJF7gxl916Fy1xjK1e1:RdW4lQw5RF8Q
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-