General
-
Target
657716d18ecf60e5cc06ff786970fe84_JaffaCakes118
-
Size
1.3MB
-
Sample
240723-a2aecsyann
-
MD5
657716d18ecf60e5cc06ff786970fe84
-
SHA1
5428b156691f26f588a00aabf3bc524f7141ed41
-
SHA256
f0e1b3c8a2f25d686a1a7bb61a28708555194eb200ebc476b2e005f4cddd3d47
-
SHA512
019d6e1ae12a6c00132a17b5e93380bcd90192d655932e75517042ede542480c3be1a150088c74f06cbf013fbb0cb3684c1445f7a5f4f7e5783c6cc5678de4d9
-
SSDEEP
24576:b8pWEmAojqMO2dYmcO/yWltt4XLa/uYFTlc:ALMLPtti4fFTK
Behavioral task
behavioral1
Sample
657716d18ecf60e5cc06ff786970fe84_JaffaCakes118.dll
Resource
win7-20240708-en
Malware Config
Extracted
danabot
4
142.11.192.232:443
192.119.110.73:443
142.11.242.31:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Targets
-
-
Target
657716d18ecf60e5cc06ff786970fe84_JaffaCakes118
-
Size
1.3MB
-
MD5
657716d18ecf60e5cc06ff786970fe84
-
SHA1
5428b156691f26f588a00aabf3bc524f7141ed41
-
SHA256
f0e1b3c8a2f25d686a1a7bb61a28708555194eb200ebc476b2e005f4cddd3d47
-
SHA512
019d6e1ae12a6c00132a17b5e93380bcd90192d655932e75517042ede542480c3be1a150088c74f06cbf013fbb0cb3684c1445f7a5f4f7e5783c6cc5678de4d9
-
SSDEEP
24576:b8pWEmAojqMO2dYmcO/yWltt4XLa/uYFTlc:ALMLPtti4fFTK
-
Danabot Loader Component
-
Blocklisted process makes network request
-