General
-
Target
b545097b070ac19766a36b4617338363_JaffaCakes118
-
Size
918KB
-
Sample
240821-19cgsstena
-
MD5
b545097b070ac19766a36b4617338363
-
SHA1
bbec26108117802436b079099a357c04296093fc
-
SHA256
22fe32fd72a901239a5635d4fb6efe588e83812e10590cd64419c612e5649e24
-
SHA512
1881ae7735e9dda6f87a3aebe4d73ffd303dd0e44c18116f6da7966ecae9d2a91e87f3956e228eaa55abffaf30f080c6bafc1603d8d43d9c2923175722387b97
-
SSDEEP
24576:8gefGu8NaXaPkoekz4R7PbMxIozXVbv+4sQuTfpy1BGZ3s:au2iy7P0Bli4Q7peBU3
Static task
static1
Behavioral task
behavioral1
Sample
b545097b070ac19766a36b4617338363_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
darkcomet
darkz
gameserver2.zapto.org:1604
DC_MUTEX-59WS2LP
-
gencode
FCPYmHSjUERL
-
install
false
-
offline_keylogger
true
-
persistence
false
Extracted
latentbot
gameserver2.zapto.org
Targets
-
-
Target
b545097b070ac19766a36b4617338363_JaffaCakes118
-
Size
918KB
-
MD5
b545097b070ac19766a36b4617338363
-
SHA1
bbec26108117802436b079099a357c04296093fc
-
SHA256
22fe32fd72a901239a5635d4fb6efe588e83812e10590cd64419c612e5649e24
-
SHA512
1881ae7735e9dda6f87a3aebe4d73ffd303dd0e44c18116f6da7966ecae9d2a91e87f3956e228eaa55abffaf30f080c6bafc1603d8d43d9c2923175722387b97
-
SSDEEP
24576:8gefGu8NaXaPkoekz4R7PbMxIozXVbv+4sQuTfpy1BGZ3s:au2iy7P0Bli4Q7peBU3
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-