General
-
Target
e2b633b6bdeb0d00712cc79dba39db1b_JaffaCakes118
-
Size
206KB
-
Sample
240915-rykjlayfml
-
MD5
e2b633b6bdeb0d00712cc79dba39db1b
-
SHA1
c33cd8157ea5f4fa0c465b6f454da48c7c0a40a9
-
SHA256
4e8eb7f568eb85fa2273f6c384ef9dee6177a2d94d5de8b506376bd45d128887
-
SHA512
50c2d6b0893d6a43b9a6516155972ffd58597eccf46119e1a9cbcbebc2ff9c31bdc6b38863cceabf5871af63a86a580f2623ad3b0b736fd7c0e10d495f8786d8
-
SSDEEP
3072:nryYXMJJciFoSYMoXYQlwfv/gF8jua3PX4Ns5drwolUtvDL57uN:lXkiq4wfv4Kjnv+srwoKDq
Behavioral task
behavioral1
Sample
e2b633b6bdeb0d00712cc79dba39db1b_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2b633b6bdeb0d00712cc79dba39db1b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
cobaltstrike
0
http://103.224.81.80:53/dpixel
-
access_type
512
-
crypto_scheme
256
-
host
103.224.81.80,/dpixel
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
60000
-
port_number
53
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCMOV1vbx7GA/iEWlGLsLIPkm/iKASiEsbF+QKunuk8toqc0pKeeP0YOChgMiMI7NtcxpduAZYO3zhFWjW3NDSkBki3klTAZHLEoFSoEPQZgFEvNBJ7+2v8nPCCsRQiCkO1ZJX9GmvO/vHF0OKaidgRQDL0Iwnuf3QJe5u3EldNswIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727)
-
watermark
0
Targets
-
-
Target
e2b633b6bdeb0d00712cc79dba39db1b_JaffaCakes118
-
Size
206KB
-
MD5
e2b633b6bdeb0d00712cc79dba39db1b
-
SHA1
c33cd8157ea5f4fa0c465b6f454da48c7c0a40a9
-
SHA256
4e8eb7f568eb85fa2273f6c384ef9dee6177a2d94d5de8b506376bd45d128887
-
SHA512
50c2d6b0893d6a43b9a6516155972ffd58597eccf46119e1a9cbcbebc2ff9c31bdc6b38863cceabf5871af63a86a580f2623ad3b0b736fd7c0e10d495f8786d8
-
SSDEEP
3072:nryYXMJJciFoSYMoXYQlwfv/gF8jua3PX4Ns5drwolUtvDL57uN:lXkiq4wfv4Kjnv+srwoKDq
Score3/10 -