General
-
Target
dda0b70ea3c031e9cabc1d729d8113a6_JaffaCakes118
-
Size
199KB
-
Sample
240913-ekx7batanm
-
MD5
dda0b70ea3c031e9cabc1d729d8113a6
-
SHA1
249b515b9c3594957fdccf2d256d009be3369bfa
-
SHA256
b36b8c300c869efaf2b8d6dd4ae4590d7acf27ca687119dd0edfbf830066ec72
-
SHA512
0e828201a00c7826257fb1be760d51d7a7802b9e9418bf903ed25cbb9009594a3e93245d018c12a4b34e51c13488b5c14570b9ca8838c5487cdce79b0486efe1
-
SSDEEP
3072:HNEfMCK7JqusgLiKG5TnN7FgkQB7R80kUzRe5b1:SfM5dS/JBN7jiR80Vo
Behavioral task
behavioral1
Sample
dda0b70ea3c031e9cabc1d729d8113a6_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dda0b70ea3c031e9cabc1d729d8113a6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
cobaltstrike
0
http://37.252.15.241:80/fwlink
-
crypto_scheme
256
-
host
37.252.15.241,/fwlink
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
60000
-
port_number
80
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDmyW6bqevjWW6DZ6+3cuzxxXBe/IOO5SymlXvl9rws8PkzeMLyzwmJ2JccNm3Z1aOCMeOnht3A5gXbRI+GX7UyXWRxkliGOdBfRW7Oa0Q5CGAxmy2f1WzbbbvEA29nz+EfIlDFmr0h8dfyyrCnsrhjtLpEcGY9HeENppg1VNdLkwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; Win64; x64; Trident/6.0)
-
watermark
0
Targets
-
-
Target
dda0b70ea3c031e9cabc1d729d8113a6_JaffaCakes118
-
Size
199KB
-
MD5
dda0b70ea3c031e9cabc1d729d8113a6
-
SHA1
249b515b9c3594957fdccf2d256d009be3369bfa
-
SHA256
b36b8c300c869efaf2b8d6dd4ae4590d7acf27ca687119dd0edfbf830066ec72
-
SHA512
0e828201a00c7826257fb1be760d51d7a7802b9e9418bf903ed25cbb9009594a3e93245d018c12a4b34e51c13488b5c14570b9ca8838c5487cdce79b0486efe1
-
SSDEEP
3072:HNEfMCK7JqusgLiKG5TnN7FgkQB7R80kUzRe5b1:SfM5dS/JBN7jiR80Vo
Score3/10 -