General
-
Target
67abc4d8511bef88b5cd7b5884951bf5_JaffaCakes118
-
Size
653KB
-
Sample
240723-p4j4xatdnh
-
MD5
67abc4d8511bef88b5cd7b5884951bf5
-
SHA1
1e6e8907e291bb71e3d2d1b5050be3a60d39f646
-
SHA256
71e9c343e1350db04d97d960f91163ea0d8c33d8149ab6225b0e018e8c161181
-
SHA512
bdd62c7d12dad525a874c689a4f46c7ff068eb2b96620a6945b87ca6e66db54f21652c26ca10eae286f048accf634f1af85aff2439fd4985f596f3108bcd8b7a
-
SSDEEP
12288:I5MlYxLWIpdgFFyIJjr2I9hPUkxuJzRUL9pYe2Xduxni+Tj:Ia4WLbJH2Wdx0JzRULjn2aT
Static task
static1
Behavioral task
behavioral1
Sample
67abc4d8511bef88b5cd7b5884951bf5_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
darkcomet
Outbound
darkcometsa.zapto.org:1604
DC_MUTEX-DTNGSWK
-
gencode
83vLgsEx21jQ
-
install
false
-
offline_keylogger
true
-
password
mikeyj4711
-
persistence
false
Extracted
latentbot
darkcometsa.zapto.org
Targets
-
-
Target
67abc4d8511bef88b5cd7b5884951bf5_JaffaCakes118
-
Size
653KB
-
MD5
67abc4d8511bef88b5cd7b5884951bf5
-
SHA1
1e6e8907e291bb71e3d2d1b5050be3a60d39f646
-
SHA256
71e9c343e1350db04d97d960f91163ea0d8c33d8149ab6225b0e018e8c161181
-
SHA512
bdd62c7d12dad525a874c689a4f46c7ff068eb2b96620a6945b87ca6e66db54f21652c26ca10eae286f048accf634f1af85aff2439fd4985f596f3108bcd8b7a
-
SSDEEP
12288:I5MlYxLWIpdgFFyIJjr2I9hPUkxuJzRUL9pYe2Xduxni+Tj:Ia4WLbJH2Wdx0JzRULjn2aT
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-