General
-
Target
fd23df75aaecb8464e12d29a6a7c2163_JaffaCakes118
-
Size
777KB
-
Sample
240928-zv2ygaygra
-
MD5
fd23df75aaecb8464e12d29a6a7c2163
-
SHA1
2fb6b1585193996e143b3f5f2d0d138052c00fa4
-
SHA256
fe3e8583a30fc407ec72a0e4a180db0f8815c260b70f3df3c1ea3cb9a5d55684
-
SHA512
f69a08375b1179b60e5770d8da0d430412fa72cd36f6d1056e13b06f569979fb640741283163d366d6bb3912428f9f861a41e3f3e6f8f573e891e47c17741e4f
-
SSDEEP
24576:aoQk4lKhQuWRCO7/nNUMWkrb4lc6nebuSV5:aPBlhdCO7vNy6OkuW
Static task
static1
Behavioral task
behavioral1
Sample
fd23df75aaecb8464e12d29a6a7c2163_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
latentbot
duckling232.zapto.org
Targets
-
-
Target
fd23df75aaecb8464e12d29a6a7c2163_JaffaCakes118
-
Size
777KB
-
MD5
fd23df75aaecb8464e12d29a6a7c2163
-
SHA1
2fb6b1585193996e143b3f5f2d0d138052c00fa4
-
SHA256
fe3e8583a30fc407ec72a0e4a180db0f8815c260b70f3df3c1ea3cb9a5d55684
-
SHA512
f69a08375b1179b60e5770d8da0d430412fa72cd36f6d1056e13b06f569979fb640741283163d366d6bb3912428f9f861a41e3f3e6f8f573e891e47c17741e4f
-
SSDEEP
24576:aoQk4lKhQuWRCO7/nNUMWkrb4lc6nebuSV5:aPBlhdCO7vNy6OkuW
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-