General
-
Target
bcf0a7afaf53ff6ad5ae12c59d5946e8_JaffaCakes118
-
Size
200KB
-
Sample
240823-ymhn7ashqa
-
MD5
bcf0a7afaf53ff6ad5ae12c59d5946e8
-
SHA1
87b63bdc8e1b8da9bc2741e6586f1dd30213af5a
-
SHA256
cd5b2da92050906e0654dc494768eaadf6bc9d70735ab9ac12b55022639ae028
-
SHA512
27fb06ba0476ac6754d02ab33a71ec8cb70d91534ce82de1ddff463ac222052600d1baca9b898a7160895830b3f286358c9610f378339359590f2702a986d620
-
SSDEEP
3072:XiuCpL66SuKvmpw0orsVTqabyxXG9jP/8DtLZiV0:XiuCwVh+QQ9qvKb/8Dq
Static task
static1
Behavioral task
behavioral1
Sample
bcf0a7afaf53ff6ad5ae12c59d5946e8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bcf0a7afaf53ff6ad5ae12c59d5946e8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.drivehq.com - Port:
21 - Username:
derro - Password:
ekim33
Targets
-
-
Target
bcf0a7afaf53ff6ad5ae12c59d5946e8_JaffaCakes118
-
Size
200KB
-
MD5
bcf0a7afaf53ff6ad5ae12c59d5946e8
-
SHA1
87b63bdc8e1b8da9bc2741e6586f1dd30213af5a
-
SHA256
cd5b2da92050906e0654dc494768eaadf6bc9d70735ab9ac12b55022639ae028
-
SHA512
27fb06ba0476ac6754d02ab33a71ec8cb70d91534ce82de1ddff463ac222052600d1baca9b898a7160895830b3f286358c9610f378339359590f2702a986d620
-
SSDEEP
3072:XiuCpL66SuKvmpw0orsVTqabyxXG9jP/8DtLZiV0:XiuCwVh+QQ9qvKb/8Dq
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-