General
-
Target
ecea7d3819fa43d727343dc1e26442c4_JaffaCakes118
-
Size
34KB
-
Sample
240920-f13bms1dmk
-
MD5
ecea7d3819fa43d727343dc1e26442c4
-
SHA1
85034b4083ac90f4849f6c6de6c8978614c86b03
-
SHA256
1c81630804b6f408d2ec4ce688cca89870e52893e59aea6d194c22bc4fb1d182
-
SHA512
badbe0f94c0f02a427a160376bfcd716b63b8ca6989589cce5c9a1af91d7f624a0372f601b6affc0ec6b9f63628d38526cef4d469739d723255e03526fe6bfd5
-
SSDEEP
768:tv2ncIPQ6RshzkmZp27DGtrtFXRVW22n2rvHSDM49vp:t6sJl27D+mDnHRh
Static task
static1
Behavioral task
behavioral1
Sample
5213706677228235947485/52137066772282356147846598.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5213706677228235947485/52137066772282356147846598.lnk
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://adrianecolburn.com/download/md2.php
Targets
-
-
Target
5213706677228235947485/52137066772282356147846598.lnk
-
Size
4KB
-
MD5
dc6cd3c09e2d75ef5f1df84472e9b4c4
-
SHA1
bc79598890a4e39720d32aaaaa803eecf1bba3e3
-
SHA256
0e85ba9b3fdcc615705fff18bdb7cafad1c99a5378f3f3518c3edc8f3d8cd805
-
SHA512
7b651dc4a8f73b8bbf5230f754f428540ee4d8b6817a85491c5149ce762bd53288d0ed727c439561455c7f5ab1b66891cd5cb291b2e940f460377e44ce3c6a28
-
SSDEEP
48:8YFAISNc2ca6rDbakVfmrhpNoVOLYYqXgP7Jiu0GCWUljXZYocIPw7ikOUqIIPwq:8u0c243VWlLVqX67cuiJp1hPwitPw2
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-