General
-
Target
edb6eadfc3be0120b6f8381af3feea9a_JaffaCakes118
-
Size
26KB
-
Sample
240920-q1lzrsyhnc
-
MD5
edb6eadfc3be0120b6f8381af3feea9a
-
SHA1
3ea7e145a5170df10c468766ad97db43253c8321
-
SHA256
f7c12026d8189fa370f5b72fb8c4d3d9f5006ddf96c010ad007a6bef6dfb9b6e
-
SHA512
c8676b262aaae9101678d2ddba233c881912fd59edf750551612b5c05bef719eb7092c1d2555686fb8a9e61a8bf375328b44fe8bd7c38d0f52a6c55c0ff2f947
-
SSDEEP
384:gor3tHs7D3Yj56FwWITfHxzrASn8nx1NxkBiQYEagyZjnDz5XP1puhWmwjROyHwQ:g83tHsehh7RzrV87siQvGjD1NomrmsU
Static task
static1
Behavioral task
behavioral1
Sample
edb6eadfc3be0120b6f8381af3feea9a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edb6eadfc3be0120b6f8381af3feea9a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: ftp- Host:
crossmadelol.vov.ru - Port:
21 - Username:
u337590 - Password:
wi4f2vo0
Targets
-
-
Target
edb6eadfc3be0120b6f8381af3feea9a_JaffaCakes118
-
Size
26KB
-
MD5
edb6eadfc3be0120b6f8381af3feea9a
-
SHA1
3ea7e145a5170df10c468766ad97db43253c8321
-
SHA256
f7c12026d8189fa370f5b72fb8c4d3d9f5006ddf96c010ad007a6bef6dfb9b6e
-
SHA512
c8676b262aaae9101678d2ddba233c881912fd59edf750551612b5c05bef719eb7092c1d2555686fb8a9e61a8bf375328b44fe8bd7c38d0f52a6c55c0ff2f947
-
SSDEEP
384:gor3tHs7D3Yj56FwWITfHxzrASn8nx1NxkBiQYEagyZjnDz5XP1puhWmwjROyHwQ:g83tHsehh7RzrV87siQvGjD1NomrmsU
Score10/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-