General
-
Target
f447d7a2f7cfb24db6b3c42716b16457_JaffaCakes118
-
Size
239KB
-
Sample
240924-xdsblascmd
-
MD5
f447d7a2f7cfb24db6b3c42716b16457
-
SHA1
6c898d8bc1b2311859b34df36e0ba9c392a30b9f
-
SHA256
67c08d2a21a3ade47ed790aa65ef7cbb117e32300b432f5be97d5ff13c745247
-
SHA512
b303f0d106ce5fadda89346e78516ca8251dd532f1efa2540085b665d9de6dbba03c77bdc7007294a893f62a5e1fe22790513b97261eb6ba4eed1aac4d870e1a
-
SSDEEP
6144:BVNqZlMVBQ9Z8sugUnQsIqrQNIlK3cMCjq:tqZlMbQHugUQsI3NK0cMCjq
Static task
static1
Behavioral task
behavioral1
Sample
f447d7a2f7cfb24db6b3c42716b16457_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
buer
https://104.248.83.13/
Targets
-
-
Target
f447d7a2f7cfb24db6b3c42716b16457_JaffaCakes118
-
Size
239KB
-
MD5
f447d7a2f7cfb24db6b3c42716b16457
-
SHA1
6c898d8bc1b2311859b34df36e0ba9c392a30b9f
-
SHA256
67c08d2a21a3ade47ed790aa65ef7cbb117e32300b432f5be97d5ff13c745247
-
SHA512
b303f0d106ce5fadda89346e78516ca8251dd532f1efa2540085b665d9de6dbba03c77bdc7007294a893f62a5e1fe22790513b97261eb6ba4eed1aac4d870e1a
-
SSDEEP
6144:BVNqZlMVBQ9Z8sugUnQsIqrQNIlK3cMCjq:tqZlMbQHugUQsI3NK0cMCjq
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-