General
-
Target
0b18382d5ac0f30d8773acb6d5671a74_JaffaCakes118
-
Size
728KB
-
Sample
241002-rnyy8s1aqq
-
MD5
0b18382d5ac0f30d8773acb6d5671a74
-
SHA1
f4ccfc6cc940aeb2a30489458f781a6c5d78fdd8
-
SHA256
af813a303e700b27c7ba44acc90ec98b650c9a0bc0d471fd337f5271c81a7458
-
SHA512
e089a7b956b692f02dbebfde28a90e2cc8ca6d6743d7587d3b21a556dfc816bd0e40215e180a026dd02ec76a7945b1f70cc4d6f6743f66bf247a52207dea73fd
-
SSDEEP
12288:8lGRF0NXm4Vtjfx8G8PpJLj8KbqOQjg3uxf9LbNgoGwWbvh8ByS9NULj7OT6G:8oRF0c43r78PbLYKKg3uxfZNgjvVWmL4
Static task
static1
Behavioral task
behavioral1
Sample
0b18382d5ac0f30d8773acb6d5671a74_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0b18382d5ac0f30d8773acb6d5671a74_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
ownage12
Targets
-
-
Target
0b18382d5ac0f30d8773acb6d5671a74_JaffaCakes118
-
Size
728KB
-
MD5
0b18382d5ac0f30d8773acb6d5671a74
-
SHA1
f4ccfc6cc940aeb2a30489458f781a6c5d78fdd8
-
SHA256
af813a303e700b27c7ba44acc90ec98b650c9a0bc0d471fd337f5271c81a7458
-
SHA512
e089a7b956b692f02dbebfde28a90e2cc8ca6d6743d7587d3b21a556dfc816bd0e40215e180a026dd02ec76a7945b1f70cc4d6f6743f66bf247a52207dea73fd
-
SSDEEP
12288:8lGRF0NXm4Vtjfx8G8PpJLj8KbqOQjg3uxf9LbNgoGwWbvh8ByS9NULj7OT6G:8oRF0c43r78PbLYKKg3uxfZNgjvVWmL4
-
RevengeRat Executable
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-