General
-
Target
02f6cd0c20673f819bba4b21f4d30d44_JaffaCakes118
-
Size
1.2MB
-
Sample
240930-ya9l5swbkb
-
MD5
02f6cd0c20673f819bba4b21f4d30d44
-
SHA1
fbc98200bb30e5fd14b547dc75311f683ae0c875
-
SHA256
463654d4c0ca86dbb8f6babe6f7614ce7475dd195bc1c6ea5b854a0ed7f6108f
-
SHA512
be485b4aed3fe843787d7a944698a4a1d0f0ad7347b0117ad77eccc3539523b4082bb913510d9b4225170108ba0579b074a229974369cf61e2c1c08fc320a66f
-
SSDEEP
24576:w6TleADmI4T1kagXHq96dUEcZeN8VTbmH:LlI1kagFUEcZeOtm
Static task
static1
Behavioral task
behavioral1
Sample
02f6cd0c20673f819bba4b21f4d30d44_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
danabot
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
Targets
-
-
Target
02f6cd0c20673f819bba4b21f4d30d44_JaffaCakes118
-
Size
1.2MB
-
MD5
02f6cd0c20673f819bba4b21f4d30d44
-
SHA1
fbc98200bb30e5fd14b547dc75311f683ae0c875
-
SHA256
463654d4c0ca86dbb8f6babe6f7614ce7475dd195bc1c6ea5b854a0ed7f6108f
-
SHA512
be485b4aed3fe843787d7a944698a4a1d0f0ad7347b0117ad77eccc3539523b4082bb913510d9b4225170108ba0579b074a229974369cf61e2c1c08fc320a66f
-
SSDEEP
24576:w6TleADmI4T1kagXHq96dUEcZeN8VTbmH:LlI1kagFUEcZeOtm
-
Danabot Loader Component
-
Blocklisted process makes network request
-
Loads dropped DLL
-