General

  • Target

    ffa93b3763eaffe46a3a521ee1111fe0_JaffaCakes118

  • Size

    1.1MB

  • MD5

    ffa93b3763eaffe46a3a521ee1111fe0

  • SHA1

    9ea0b10ec84f4dfae053241e9f5e5eccc6f218e9

  • SHA256

    4b1860afaed0deea82ae3845609b8ce2e87e3d78caed8957bb0e05176d713d7a

  • SHA512

    a7e2c5a3d480a0a78fad7b117d8bdd62b43017ec31ed6518ba9456293c27bfcc65f90b8dd7a2b5cfd077af1e135dbda0ff82a033cdce84e44ca90ba043356902

  • SSDEEP

    24576:0R5VtI4Zmkyc1v/fRbpBoPSijobZ+QWzpAtjudEQffOe:05VtI41v/plB4Fu9Aytj4Nr

Score
8/10
upx

Malware Config

Signatures

  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 5 IoCs

    Checks for missing Authenticode signature.

Files

  • ffa93b3763eaffe46a3a521ee1111fe0_JaffaCakes118
    .zip
  • Edit-server.exe
    .exe windows:1 windows x86 arch:x86


    Headers

    Sections

  • Images/_dumb-ass.bmp
  • Images/_fbi.bmp
  • Images/_fucked.bmp
  • Images/_hacked.bmp
  • Images/_hacked2.bmp
  • Images/_hdkp.bmp
  • Images/_hello.bmp
  • Images/_netdevil.bmp
  • Images/_normal.bmp
  • Images/_stop.bmp
  • Images/_sup.bmp
  • Net-Devil.exe
    .exe windows:1 windows x86 arch:x86


    Headers

    Sections

  • ReadMe.txt
  • ReadmeNow.txt
  • Server.exe
    .exe windows:1 windows x86 arch:x86


    Headers

    Sections

  • Warning.txt
  • elhacker.net.url
  • icons.icl
  • upx.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections