General
-
Target
2f3ce115601d43d540c57e679259f105_JaffaCakes118
-
Size
346KB
-
Sample
240729-bcn2wsygje
-
MD5
2f3ce115601d43d540c57e679259f105
-
SHA1
79e728592ee89467d88a5c684b93002febcd7e4f
-
SHA256
f0562d49226fc4776a7991b14f43b2c7a572ae276adef3d3dc3678b8b0894401
-
SHA512
397f86996de981fe1526b4ce62dab7898b8112517901dffb75e183e612be83ae677d10bf3be41904ce3cb9375460e6479625368fe637fb1d789257d57e1f0cfb
-
SSDEEP
6144:QXX4Z20mfZDHwMznP9pTz8qv2peSg1Odbr2X3f+gOkXdhFr:Qn4xu5P9p8q+0hOV2XWgO8hFr
Static task
static1
Behavioral task
behavioral1
Sample
2f3ce115601d43d540c57e679259f105_JaffaCakes118.exe
Resource
win7-20240705-en
Malware Config
Extracted
systembc
knock0909.monster:4035
knock0909.xyz:4035
Targets
-
-
Target
2f3ce115601d43d540c57e679259f105_JaffaCakes118
-
Size
346KB
-
MD5
2f3ce115601d43d540c57e679259f105
-
SHA1
79e728592ee89467d88a5c684b93002febcd7e4f
-
SHA256
f0562d49226fc4776a7991b14f43b2c7a572ae276adef3d3dc3678b8b0894401
-
SHA512
397f86996de981fe1526b4ce62dab7898b8112517901dffb75e183e612be83ae677d10bf3be41904ce3cb9375460e6479625368fe637fb1d789257d57e1f0cfb
-
SSDEEP
6144:QXX4Z20mfZDHwMznP9pTz8qv2peSg1Odbr2X3f+gOkXdhFr:Qn4xu5P9p8q+0hOV2XWgO8hFr
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-