General
-
Target
ec6e4b29c17f3a67c6a750ea32ed05cf_JaffaCakes118
-
Size
196KB
-
Sample
240919-3yh7baybkn
-
MD5
ec6e4b29c17f3a67c6a750ea32ed05cf
-
SHA1
7785993c160afd33a0cdd55fc8321ccbd14ae796
-
SHA256
c81e9648f5cb972ee686bd3b7699405dce0657fcefedc55603d8bfcd5261476b
-
SHA512
be99f1976ec4afac8b74e7053fb15da94d57f032e1de52a6a403b3f356d6cfc21480679e1ac02de79e57fb5667facade803723a0092f8e09b48a8f54f44cbe3c
-
SSDEEP
3072:2KBxpWutCmcEdschYDZHoM8bmsisitP7:2KFlJAHYbvg7
Static task
static1
Behavioral task
behavioral1
Sample
ec6e4b29c17f3a67c6a750ea32ed05cf_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec6e4b29c17f3a67c6a750ea32ed05cf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
smokeloader
VgU
Extracted
smokeloader
2018
http://biharmart.com/ip/
Targets
-
-
Target
ec6e4b29c17f3a67c6a750ea32ed05cf_JaffaCakes118
-
Size
196KB
-
MD5
ec6e4b29c17f3a67c6a750ea32ed05cf
-
SHA1
7785993c160afd33a0cdd55fc8321ccbd14ae796
-
SHA256
c81e9648f5cb972ee686bd3b7699405dce0657fcefedc55603d8bfcd5261476b
-
SHA512
be99f1976ec4afac8b74e7053fb15da94d57f032e1de52a6a403b3f356d6cfc21480679e1ac02de79e57fb5667facade803723a0092f8e09b48a8f54f44cbe3c
-
SSDEEP
3072:2KBxpWutCmcEdschYDZHoM8bmsisitP7:2KFlJAHYbvg7
Score10/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-