General
-
Target
dda73a0896d03d2b30eef967250fa6d1_JaffaCakes118
-
Size
360KB
-
Sample
240913-et5mrateml
-
MD5
dda73a0896d03d2b30eef967250fa6d1
-
SHA1
952909c7ad5ad665723bc9660dd47c4724203fd2
-
SHA256
1407f082426382f4c40b1dad6f9a38562d82f8dbfe09bf82d0a0e60102790450
-
SHA512
9ca8b118d3a9bf97bbded2d07c4ce0aef481e3a48004c1105e56ba346b1b8fa680d9bf8258c57d43b2c29ff11034a584a213d06faae196f1460ff31b2f40b30f
-
SSDEEP
6144:wBVt4nzqGVbFNxDouQj8HJqLVxx4qNDM9HeU9hBFHDKh2PlokQGze:64nZVJNVNQjSYx/NDM9HeAhBJjl1Qce
Static task
static1
Behavioral task
behavioral1
Sample
dda73a0896d03d2b30eef967250fa6d1_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
https://goo.gl/5ZjYus
Targets
-
-
Target
dda73a0896d03d2b30eef967250fa6d1_JaffaCakes118
-
Size
360KB
-
MD5
dda73a0896d03d2b30eef967250fa6d1
-
SHA1
952909c7ad5ad665723bc9660dd47c4724203fd2
-
SHA256
1407f082426382f4c40b1dad6f9a38562d82f8dbfe09bf82d0a0e60102790450
-
SHA512
9ca8b118d3a9bf97bbded2d07c4ce0aef481e3a48004c1105e56ba346b1b8fa680d9bf8258c57d43b2c29ff11034a584a213d06faae196f1460ff31b2f40b30f
-
SSDEEP
6144:wBVt4nzqGVbFNxDouQj8HJqLVxx4qNDM9HeU9hBFHDKh2PlokQGze:64nZVJNVNQjSYx/NDM9HeAhBJjl1Qce
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-