General
-
Target
cde62035d367086bf018322cea753c7f_JaffaCakes118
-
Size
214KB
-
Sample
240901-a38csavelk
-
MD5
cde62035d367086bf018322cea753c7f
-
SHA1
8af17d756277288421b588a7c96378ded7b8bf19
-
SHA256
32a8ebd0557e12dc7814bd00de287c4d7e269959c7777f8ce6c80092f67139f8
-
SHA512
b08abee51d534aa31cdbbbf0af14f36da34916a4e3bb67406309eb3220e2ff38803921af7aa6206addfc9b87f1abf5239970ccfc4d59cec81b735818e4348ce9
-
SSDEEP
6144:T6CBZxIoCqeI8QQngxG9xOC35WmnqHLtOy:HBZxRlexEk98YiF
Static task
static1
Behavioral task
behavioral1
Sample
cde62035d367086bf018322cea753c7f_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
http://95.211.27.154/install.php?id=02901
Extracted
http://urodinam.net/8732489273.php
Targets
-
-
Target
cde62035d367086bf018322cea753c7f_JaffaCakes118
-
Size
214KB
-
MD5
cde62035d367086bf018322cea753c7f
-
SHA1
8af17d756277288421b588a7c96378ded7b8bf19
-
SHA256
32a8ebd0557e12dc7814bd00de287c4d7e269959c7777f8ce6c80092f67139f8
-
SHA512
b08abee51d534aa31cdbbbf0af14f36da34916a4e3bb67406309eb3220e2ff38803921af7aa6206addfc9b87f1abf5239970ccfc4d59cec81b735818e4348ce9
-
SSDEEP
6144:T6CBZxIoCqeI8QQngxG9xOC35WmnqHLtOy:HBZxRlexEk98YiF
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-