General
-
Target
dfcabb4fe83a48168317bb52644582af_JaffaCakes118
-
Size
209KB
-
Sample
240914-jzj1fstfql
-
MD5
dfcabb4fe83a48168317bb52644582af
-
SHA1
b75212a72147b16ab2a4c6057bdb4c034bc0533d
-
SHA256
374dfac7378794f1b4a2b8595944fdff10d5a6cb14b0053c756ad4ca43184518
-
SHA512
936e08e7068f75239713523f8300c5ad1fe231a8ea234404169aa91a37cc4aaf04f85bf65a34a86120bd73e6021868b1cd8ec46e5a101a9d149950fa6d0872e4
-
SSDEEP
6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1U4:cnLh9yn52rpUR5vHuRYpM+4
Behavioral task
behavioral1
Sample
dfcabb4fe83a48168317bb52644582af_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
systembc
yan0212.com:4039
yan0212.net:4039
Targets
-
-
Target
dfcabb4fe83a48168317bb52644582af_JaffaCakes118
-
Size
209KB
-
MD5
dfcabb4fe83a48168317bb52644582af
-
SHA1
b75212a72147b16ab2a4c6057bdb4c034bc0533d
-
SHA256
374dfac7378794f1b4a2b8595944fdff10d5a6cb14b0053c756ad4ca43184518
-
SHA512
936e08e7068f75239713523f8300c5ad1fe231a8ea234404169aa91a37cc4aaf04f85bf65a34a86120bd73e6021868b1cd8ec46e5a101a9d149950fa6d0872e4
-
SSDEEP
6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1U4:cnLh9yn52rpUR5vHuRYpM+4
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-