General
-
Target
c5d25323ff2485599bc5eb6646ea246e_JaffaCakes118
-
Size
335KB
-
Sample
240827-1xzrkavhqn
-
MD5
c5d25323ff2485599bc5eb6646ea246e
-
SHA1
14066b1de7794e035f80aefd96b2a0ec48525e4a
-
SHA256
a95ce1288d1f507831a7c257d2ee148f8fffbe4690e2a8dc8d96ce4886e094a1
-
SHA512
71f3c0efb9139b41d21f8d190b1be3791da1e3e3610e15cc4ac193be1afd9200aac9663f9af62f885581d0128accff5c8b53076467f03a12db5cad7d5e8b00a1
-
SSDEEP
6144:nbaydxXqngWpKN+rbZnLrL2Mu1bUlhX0FZ9IhzM9oo6dWcB:nbDxXPWpKN+hjvoqhVUVa
Static task
static1
Behavioral task
behavioral1
Sample
c5d25323ff2485599bc5eb6646ea246e_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
trickbot
1000209
lib242
188.124.167.132:449
93.109.242.134:443
41.211.9.226:443
158.58.131.54:443
36.74.100.211:449
87.255.24.238:449
200.111.167.227:449
109.86.227.152:443
85.172.38.59:449
190.4.189.129:443
65.30.201.40:443
66.232.212.59:443
80.53.57.146:443
182.253.210.130:449
155.133.31.21:449
94.112.52.197:449
209.121.142.202:449
5.102.177.205:449
209.121.142.214:449
95.161.180.42:449
185.42.192.194:449
46.72.175.17:449
144.48.51.8:443
94.250.255.177:443
185.180.198.37:443
195.54.162.96:443
194.87.93.6:443
104.193.252.167:443
185.159.129.51:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Targets
-
-
Target
c5d25323ff2485599bc5eb6646ea246e_JaffaCakes118
-
Size
335KB
-
MD5
c5d25323ff2485599bc5eb6646ea246e
-
SHA1
14066b1de7794e035f80aefd96b2a0ec48525e4a
-
SHA256
a95ce1288d1f507831a7c257d2ee148f8fffbe4690e2a8dc8d96ce4886e094a1
-
SHA512
71f3c0efb9139b41d21f8d190b1be3791da1e3e3610e15cc4ac193be1afd9200aac9663f9af62f885581d0128accff5c8b53076467f03a12db5cad7d5e8b00a1
-
SSDEEP
6144:nbaydxXqngWpKN+rbZnLrL2Mu1bUlhX0FZ9IhzM9oo6dWcB:nbDxXPWpKN+hjvoqhVUVa
-
Trickbot x86 loader
Detected Trickbot's x86 loader that unpacks the x86 payload.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-