General
-
Target
c30305376703231413e1ce49b4b5f9da_JaffaCakes118
-
Size
1.2MB
-
Sample
240826-pt4qkatfkg
-
MD5
c30305376703231413e1ce49b4b5f9da
-
SHA1
b6d521817310336a99d891df1966dc0326384352
-
SHA256
1dae4315cb8643e99e9d8fd908d09bcc90d72753ac0678b79f012388d0fb07c7
-
SHA512
aa282c07fd9e4876f796064e226be059b1caeadc4905bbbd7625d1a71f17b9131a9614e2dd9e336d8b59022e322650b7cca4b78a4e47e5c4063e2be8c8aa6861
-
SSDEEP
24576:7M8/F06+lzHBIiDJS6wkfHi/vm93i7P+d18nDTcwxkXAhvHe:PFzIHpi29ya1gcwdQ
Static task
static1
Behavioral task
behavioral1
Sample
c30305376703231413e1ce49b4b5f9da_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
darkcomet
Malakas
freskoskato.zapto.org:3030
DCMIN_MUTEX-WKAQQJ6
-
gencode
x6lGBwQztFAB
-
install
false
-
offline_keylogger
true
-
persistence
false
Extracted
latentbot
freskoskato.zapto.org
Targets
-
-
Target
c30305376703231413e1ce49b4b5f9da_JaffaCakes118
-
Size
1.2MB
-
MD5
c30305376703231413e1ce49b4b5f9da
-
SHA1
b6d521817310336a99d891df1966dc0326384352
-
SHA256
1dae4315cb8643e99e9d8fd908d09bcc90d72753ac0678b79f012388d0fb07c7
-
SHA512
aa282c07fd9e4876f796064e226be059b1caeadc4905bbbd7625d1a71f17b9131a9614e2dd9e336d8b59022e322650b7cca4b78a4e47e5c4063e2be8c8aa6861
-
SSDEEP
24576:7M8/F06+lzHBIiDJS6wkfHi/vm93i7P+d18nDTcwxkXAhvHe:PFzIHpi29ya1gcwdQ
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-