General
-
Target
ea18fe0423c75ef98ba67ff5007c4ebe_JaffaCakes118
-
Size
1.1MB
-
Sample
240918-2jjc4awhje
-
MD5
ea18fe0423c75ef98ba67ff5007c4ebe
-
SHA1
639e898a3bd5ecd30d78f7c7e8893e79229bdfcf
-
SHA256
6a22a4de220e4e271f2b9136ce963d1eb86fb2545f83f167de05dea3dca0904f
-
SHA512
2c59ba02c4c19dfef8fe9bcbf00047484673ce8ef879c69245b303740997816f7c3965bb7c9f79d91a737d917a6f4e4fdef6bc6dc974616f7733a46a7e1e267e
-
SSDEEP
12288:5eyzrb2QQHxrYttm4Cfxa9ViAzKPDXkU9w4gUKdzKxi+2/AalQLZHf01noDPaswM:XDt4uF4Z/5AZJt2oancdh5kIHR6/XNV
Static task
static1
Behavioral task
behavioral1
Sample
ea18fe0423c75ef98ba67ff5007c4ebe_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Guest16
darkcomet453.zapto.org:1609
DC_MUTEX-ZRS9PQR
-
gencode
usGcWAbWklcw
-
install
false
-
offline_keylogger
true
-
password
javaansejongens74
-
persistence
false
Extracted
latentbot
darkcomet453.zapto.org
Targets
-
-
Target
ea18fe0423c75ef98ba67ff5007c4ebe_JaffaCakes118
-
Size
1.1MB
-
MD5
ea18fe0423c75ef98ba67ff5007c4ebe
-
SHA1
639e898a3bd5ecd30d78f7c7e8893e79229bdfcf
-
SHA256
6a22a4de220e4e271f2b9136ce963d1eb86fb2545f83f167de05dea3dca0904f
-
SHA512
2c59ba02c4c19dfef8fe9bcbf00047484673ce8ef879c69245b303740997816f7c3965bb7c9f79d91a737d917a6f4e4fdef6bc6dc974616f7733a46a7e1e267e
-
SSDEEP
12288:5eyzrb2QQHxrYttm4Cfxa9ViAzKPDXkU9w4gUKdzKxi+2/AalQLZHf01noDPaswM:XDt4uF4Z/5AZJt2oancdh5kIHR6/XNV
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-