General
-
Target
fb13adf0c54943795f49d6faaab03896_JaffaCakes118
-
Size
60KB
-
Sample
240927-27rpdaxbmc
-
MD5
fb13adf0c54943795f49d6faaab03896
-
SHA1
f4ddf0dfd479337a4e9bfaf192c1842cc07f437a
-
SHA256
eed3c571b2769d58f5a7543cba5c805acae2403bc5fdaedb171701a430a36fed
-
SHA512
107b9c67df19dc883802f93f885469d6c3166921bacd37588e96291527315e1af5aaa2e60985f4b61b49eeddafefae325688237e03d9ddde4ebf1d746833d3de
-
SSDEEP
768:cYBnWfcQvkQ3GsspHrSw2N7JnCXpkGfaN5qSgmpPWLNl2BD98qI9bV:c30Qvr3GsG+wYZCXGGfaSxLyoqgV
Behavioral task
behavioral1
Sample
fb13adf0c54943795f49d6faaab03896_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb13adf0c54943795f49d6faaab03896_JaffaCakes118.exe
Resource
win10v2004-20240910-en
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1qkBF7CJtNtikeSamnaw_QoVf18a1vB30
Targets
-
-
Target
fb13adf0c54943795f49d6faaab03896_JaffaCakes118
-
Size
60KB
-
MD5
fb13adf0c54943795f49d6faaab03896
-
SHA1
f4ddf0dfd479337a4e9bfaf192c1842cc07f437a
-
SHA256
eed3c571b2769d58f5a7543cba5c805acae2403bc5fdaedb171701a430a36fed
-
SHA512
107b9c67df19dc883802f93f885469d6c3166921bacd37588e96291527315e1af5aaa2e60985f4b61b49eeddafefae325688237e03d9ddde4ebf1d746833d3de
-
SSDEEP
768:cYBnWfcQvkQ3GsspHrSw2N7JnCXpkGfaN5qSgmpPWLNl2BD98qI9bV:c30Qvr3GsG+wYZCXGGfaSxLyoqgV
Score10/10-
Guloader payload
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-