General
-
Target
7d8f0a53352c9188acef922dbecfa588_JaffaCakes118
-
Size
577KB
-
Sample
240731-xmp8laybqq
-
MD5
7d8f0a53352c9188acef922dbecfa588
-
SHA1
dc6115bdc6d63f476203e54e40cb35df72d4014d
-
SHA256
e12b58b042e361d227d4cc3e60e5b5c8ef49c7f70c306d1159c71a7eb335f5cd
-
SHA512
6dd3b5d633344f0ee5d59589c28f45ab3647c5d41da27fe39f3025b826b2043a4fc094862762d4080d6546acac4996d25484501b09dc18da597dfb42e6600fa6
-
SSDEEP
12288:TCLIa6MfgkSnojUbPYLAwiw7gku+uFvTBMrKr:uLI8LLAwxgr7r
Static task
static1
Behavioral task
behavioral1
Sample
7d8f0a53352c9188acef922dbecfa588_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Extracted
buer
https://178.62.46.155/
Targets
-
-
Target
7d8f0a53352c9188acef922dbecfa588_JaffaCakes118
-
Size
577KB
-
MD5
7d8f0a53352c9188acef922dbecfa588
-
SHA1
dc6115bdc6d63f476203e54e40cb35df72d4014d
-
SHA256
e12b58b042e361d227d4cc3e60e5b5c8ef49c7f70c306d1159c71a7eb335f5cd
-
SHA512
6dd3b5d633344f0ee5d59589c28f45ab3647c5d41da27fe39f3025b826b2043a4fc094862762d4080d6546acac4996d25484501b09dc18da597dfb42e6600fa6
-
SSDEEP
12288:TCLIa6MfgkSnojUbPYLAwiw7gku+uFvTBMrKr:uLI8LLAwxgr7r
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-