General
-
Target
dded910ff442d3314400dcd0e7e699ee_JaffaCakes118
-
Size
96KB
-
Sample
240913-h1rags1drb
-
MD5
dded910ff442d3314400dcd0e7e699ee
-
SHA1
0c11115fd32e2ad3f4b9cf514a4d088b80c61917
-
SHA256
048455f6416671249ff633c4a0525bb6bb2d6d871de7b74438247c719c2b2103
-
SHA512
58d51860f2767d70edc18b958540717f5607466c88a193652a324b2646573221a810f11bfd1c317bcacd92fe2aa0754cabc1e0a37fd4037fde8f052a50a504b2
-
SSDEEP
768:5bUtftRf4UxdhR3evOk4PmvX4OdBh9Ckt0mCIpn942KjNZ:FU574UxdX3eWNM4QBhQkLXn9lKjz
Static task
static1
Behavioral task
behavioral1
Sample
dded910ff442d3314400dcd0e7e699ee_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dded910ff442d3314400dcd0e7e699ee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1-oABThuFsnkg4zSME6JGpnZMWcavHifR
Targets
-
-
Target
dded910ff442d3314400dcd0e7e699ee_JaffaCakes118
-
Size
96KB
-
MD5
dded910ff442d3314400dcd0e7e699ee
-
SHA1
0c11115fd32e2ad3f4b9cf514a4d088b80c61917
-
SHA256
048455f6416671249ff633c4a0525bb6bb2d6d871de7b74438247c719c2b2103
-
SHA512
58d51860f2767d70edc18b958540717f5607466c88a193652a324b2646573221a810f11bfd1c317bcacd92fe2aa0754cabc1e0a37fd4037fde8f052a50a504b2
-
SSDEEP
768:5bUtftRf4UxdhR3evOk4PmvX4OdBh9Ckt0mCIpn942KjNZ:FU574UxdX3eWNM4QBhQkLXn9lKjz
Score10/10-
Guloader payload
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-