General
-
Target
ffc21cddf522b1800d41b4a41da2c24e_JaffaCakes118
-
Size
3.4MB
-
Sample
240930-cs1w3asgqq
-
MD5
ffc21cddf522b1800d41b4a41da2c24e
-
SHA1
bdcbe7b199cb8531b2262c37d3e535ffc5aa72e7
-
SHA256
7a97516b3a8eff94b12dbaa5538373921f076b13ac3865d3299749a701510db6
-
SHA512
9479f902ee5a70bc76a44e418a9a012024ba88dcc8f7b02acdb414f61516bfe0e5c41c2f52f591b8d201612b26021d853a68261eeb6c072dcb969d270e7b5079
-
SSDEEP
98304:oTLr/vwnSlGuICx42P2ivKIrZzOMIobLCWe0M+v/1:o3rGcGskinrZ9CQX
Static task
static1
Behavioral task
behavioral1
Sample
ffc21cddf522b1800d41b4a41da2c24e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffc21cddf522b1800d41b4a41da2c24e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
ffc21cddf522b1800d41b4a41da2c24e_JaffaCakes118
-
Size
3.4MB
-
MD5
ffc21cddf522b1800d41b4a41da2c24e
-
SHA1
bdcbe7b199cb8531b2262c37d3e535ffc5aa72e7
-
SHA256
7a97516b3a8eff94b12dbaa5538373921f076b13ac3865d3299749a701510db6
-
SHA512
9479f902ee5a70bc76a44e418a9a012024ba88dcc8f7b02acdb414f61516bfe0e5c41c2f52f591b8d201612b26021d853a68261eeb6c072dcb969d270e7b5079
-
SSDEEP
98304:oTLr/vwnSlGuICx42P2ivKIrZzOMIobLCWe0M+v/1:o3rGcGskinrZ9CQX
Score10/10-
Panda Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-