General
-
Target
68d23586eef34a76a3e58cfc1bfdcb80_JaffaCakes118
-
Size
45KB
-
Sample
240729-31pf4sxdrq
-
MD5
68d23586eef34a76a3e58cfc1bfdcb80
-
SHA1
7218ab8b9e02553b466361c043caa09a350e42b2
-
SHA256
dcaf6810871062a1a5a292c8e46667a8b7de908d292513ef1c443929ce8897c5
-
SHA512
20c09977afc6d0d787b481274ec7db6110691d342dbb25ddf9408a5e8a853cf79ff158e9552239d71fa4aafd247e72fdac0f653c92346945c8fbb84252cd72e3
-
SSDEEP
768:nugaNTokqd97WUHgAKpmo2q7HKjGKG6PIyzjbFgX3iUaLtlW8XHBWBDZ/x:nugaNToTdQT2mKYDy3bCXSFtl5x4d/x
Behavioral task
behavioral1
Sample
68d23586eef34a76a3e58cfc1bfdcb80_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:4444
127.0.0.1:16155
127.0.0.1:15558
2.tcp.eu.ngrok.io:6606
2.tcp.eu.ngrok.io:7707
2.tcp.eu.ngrok.io:8808
2.tcp.eu.ngrok.io:4444
2.tcp.eu.ngrok.io:16155
2.tcp.eu.ngrok.io:15558
Mutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
MicrosoftService.exe
-
install_folder
%AppData%
Targets
-
-
Target
68d23586eef34a76a3e58cfc1bfdcb80_JaffaCakes118
-
Size
45KB
-
MD5
68d23586eef34a76a3e58cfc1bfdcb80
-
SHA1
7218ab8b9e02553b466361c043caa09a350e42b2
-
SHA256
dcaf6810871062a1a5a292c8e46667a8b7de908d292513ef1c443929ce8897c5
-
SHA512
20c09977afc6d0d787b481274ec7db6110691d342dbb25ddf9408a5e8a853cf79ff158e9552239d71fa4aafd247e72fdac0f653c92346945c8fbb84252cd72e3
-
SSDEEP
768:nugaNTokqd97WUHgAKpmo2q7HKjGKG6PIyzjbFgX3iUaLtlW8XHBWBDZ/x:nugaNToTdQT2mKYDy3bCXSFtl5x4d/x
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-