General
-
Target
f0deade5174321c58ad77324ab5588a8_JaffaCakes118
-
Size
1.4MB
-
Sample
240921-3xlaaa1enb
-
MD5
f0deade5174321c58ad77324ab5588a8
-
SHA1
2b3a1492283804e8b5c430450f6b3851acab5e78
-
SHA256
9d3039608025a43f763d86060b67c53deaf51c562ada90381325181681bd9db9
-
SHA512
e469f2ee815c1ee742ff6266b57d0bf927a7a11cd2e984f12b9065c67696b1ef1e16eab8a1e185b18c8994bf3eb0727402ec49ee69ac7b8232073157a076e770
-
SSDEEP
24576:vw2O9/TgwrSUhVPHahmorI0hnvUwLS4PfzKRWkvc+4R:495cwOI0ZhMCBR
Static task
static1
Behavioral task
behavioral1
Sample
f0deade5174321c58ad77324ab5588a8_JaffaCakes118.ps1
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f0deade5174321c58ad77324ab5588a8_JaffaCakes118.ps1
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
2.4.3 Pro
Rich-Fam1-C.J
rich-fam1.strangled.net:6628
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
3
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
oiuyg
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
iuytfdcuytf-Q5AT11
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
f0deade5174321c58ad77324ab5588a8_JaffaCakes118
-
Size
1.4MB
-
MD5
f0deade5174321c58ad77324ab5588a8
-
SHA1
2b3a1492283804e8b5c430450f6b3851acab5e78
-
SHA256
9d3039608025a43f763d86060b67c53deaf51c562ada90381325181681bd9db9
-
SHA512
e469f2ee815c1ee742ff6266b57d0bf927a7a11cd2e984f12b9065c67696b1ef1e16eab8a1e185b18c8994bf3eb0727402ec49ee69ac7b8232073157a076e770
-
SSDEEP
24576:vw2O9/TgwrSUhVPHahmorI0hnvUwLS4PfzKRWkvc+4R:495cwOI0ZhMCBR
Score10/10-
Drops startup file
-
Executes dropped EXE
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-