General
-
Target
9291fc52802c84ed131b5375b6fa87e7_JaffaCakes118
-
Size
81KB
-
Sample
240813-lvvx9s1gkq
-
MD5
9291fc52802c84ed131b5375b6fa87e7
-
SHA1
2e77a05b0c2bc95132b5ac763bed0141ab240107
-
SHA256
6a67b78c206658ed05a7034d5b9f240416e57671b92372fcdef36ec4d753cd5f
-
SHA512
bc7453bfa3b67d3b10e128436bb9ccd6198896db03915293880724376fb7c081d9259d3909b068160c4a0652bb7c2fc803669720d22e345d889fb37349409361
-
SSDEEP
1536:0V+52ozzpyU3HyrLge7vWUsoTCBbAYO71a5:0W2YpL33e7vWU/uBbHO7A5
Static task
static1
Behavioral task
behavioral1
Sample
9291fc52802c84ed131b5375b6fa87e7_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9291fc52802c84ed131b5375b6fa87e7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
9291fc52802c84ed131b5375b6fa87e7_JaffaCakes118
-
Size
81KB
-
MD5
9291fc52802c84ed131b5375b6fa87e7
-
SHA1
2e77a05b0c2bc95132b5ac763bed0141ab240107
-
SHA256
6a67b78c206658ed05a7034d5b9f240416e57671b92372fcdef36ec4d753cd5f
-
SHA512
bc7453bfa3b67d3b10e128436bb9ccd6198896db03915293880724376fb7c081d9259d3909b068160c4a0652bb7c2fc803669720d22e345d889fb37349409361
-
SSDEEP
1536:0V+52ozzpyU3HyrLge7vWUsoTCBbAYO71a5:0W2YpL33e7vWU/uBbHO7A5
Score10/10-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-