General
-
Target
7847248792fb84e999bdda3ffb753c54_JaffaCakes118
-
Size
94KB
-
Sample
240727-p98z8a1akk
-
MD5
7847248792fb84e999bdda3ffb753c54
-
SHA1
81cc52bbf2232a25a93a0d0796d803537f9b01de
-
SHA256
8c53c637ddb5466656e8fee98db33af4164710525d54c8e5c1c0a601944d6b46
-
SHA512
a684c9b2f194d79daf643787beb596968239a09a604fde80554212f68f7738f521037b0d01c72f1184975800272f6da1021c1cc998e8e5a77fcbe4963bd22cf4
-
SSDEEP
768:uW68HH9u80pxQKc0R7iONSlgV+f1ad7hrB7WYJ8Fjh7hQzTGfL7YmcZn5mmZn:uWFHH9u8kx9cClSl4w1q9rB2zQkOv
Static task
static1
Behavioral task
behavioral1
Sample
7847248792fb84e999bdda3ffb753c54_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7847248792fb84e999bdda3ffb753c54_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
myofficelog - Password:
741852
Targets
-
-
Target
7847248792fb84e999bdda3ffb753c54_JaffaCakes118
-
Size
94KB
-
MD5
7847248792fb84e999bdda3ffb753c54
-
SHA1
81cc52bbf2232a25a93a0d0796d803537f9b01de
-
SHA256
8c53c637ddb5466656e8fee98db33af4164710525d54c8e5c1c0a601944d6b46
-
SHA512
a684c9b2f194d79daf643787beb596968239a09a604fde80554212f68f7738f521037b0d01c72f1184975800272f6da1021c1cc998e8e5a77fcbe4963bd22cf4
-
SSDEEP
768:uW68HH9u80pxQKc0R7iONSlgV+f1ad7hrB7WYJ8Fjh7hQzTGfL7YmcZn5mmZn:uWFHH9u8kx9cClSl4w1q9rB2zQkOv
Score10/10-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-