General
-
Target
e4ac5c8f86d34d045310b8eaff59b58b_JaffaCakes118
-
Size
207KB
-
Sample
240916-nlcfnsvenm
-
MD5
e4ac5c8f86d34d045310b8eaff59b58b
-
SHA1
f1d4c716f5d49be4a98ef076947a2ebbb4306e16
-
SHA256
235dda0d319265b0f09c37d69b11a3fc9a3449cb3e647583705285dee13b6419
-
SHA512
571f238bb2070f9962f5080c5968afa5ab31fb83ffe6875e1848e69292e72cee259974ce4bb8cd233965a8b38d700323ae6f424fad52a1e74c85336ff0f3cd80
-
SSDEEP
3072:KlC60GeD6N9Za5Yp6zPC952DmKX0tDV2/jqBkLcP6j5UDpzT5G:KNxfaWUzPWEKKX0pURLcyjUpzY
Behavioral task
behavioral1
Sample
e4ac5c8f86d34d045310b8eaff59b58b_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4ac5c8f86d34d045310b8eaff59b58b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
cobaltstrike
0
http://123.207.143.211:4555/__utm.gif
-
access_type
512
-
crypto_scheme
256
-
host
123.207.143.211,/__utm.gif
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
polling_time
60000
-
port_number
4555
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCTUlJ7J79z/MkkV8+MsYlOvREE2hhdGNzrKPFZ10lY0K5legA+um5JxESEaC0woDgSmOGrkh1giz/aQwd6tG4mihFgpi0oIbfwu6XZbE6ghYGyu2F7+A5TifRUzvU0YLXjK78EW12XhjHx4KopMF/AtOAueGwfiI2DmXwNzrBDvwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; NP09; NP09; MAAU)
-
watermark
0
Targets
-
-
Target
e4ac5c8f86d34d045310b8eaff59b58b_JaffaCakes118
-
Size
207KB
-
MD5
e4ac5c8f86d34d045310b8eaff59b58b
-
SHA1
f1d4c716f5d49be4a98ef076947a2ebbb4306e16
-
SHA256
235dda0d319265b0f09c37d69b11a3fc9a3449cb3e647583705285dee13b6419
-
SHA512
571f238bb2070f9962f5080c5968afa5ab31fb83ffe6875e1848e69292e72cee259974ce4bb8cd233965a8b38d700323ae6f424fad52a1e74c85336ff0f3cd80
-
SSDEEP
3072:KlC60GeD6N9Za5Yp6zPC952DmKX0tDV2/jqBkLcP6j5UDpzT5G:KNxfaWUzPWEKKX0pURLcyjUpzY
Score3/10 -