General
-
Target
1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118
-
Size
1.1MB
-
Sample
241003-yr6ltaxeka
-
MD5
1055352791c46b8a94ef0372c6ed19ab
-
SHA1
50ae3bf5596a3f3a8603041a8b682d0bd4c18fad
-
SHA256
6db86df6a4d4a4f7f1988bf9a0138cec8ad6526491f7114bbb88e752798b77b0
-
SHA512
9a0975e2a70d9266019124561362e8286945efd3455b24f73da0a7f3a50571e88737207e70710b0a62572d976ec593836b7654ad03a09c8dbf35b8ad5d48ad58
-
SSDEEP
24576:CupRi52nSVkBIEWYzIDM6z185HhTD9Ctpr0hNSNV0M:C5VkB5oM7JBCtF9
Static task
static1
Behavioral task
behavioral1
Sample
1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
latentbot
hackerlamer.zapto.org
Targets
-
-
Target
1055352791c46b8a94ef0372c6ed19ab_JaffaCakes118
-
Size
1.1MB
-
MD5
1055352791c46b8a94ef0372c6ed19ab
-
SHA1
50ae3bf5596a3f3a8603041a8b682d0bd4c18fad
-
SHA256
6db86df6a4d4a4f7f1988bf9a0138cec8ad6526491f7114bbb88e752798b77b0
-
SHA512
9a0975e2a70d9266019124561362e8286945efd3455b24f73da0a7f3a50571e88737207e70710b0a62572d976ec593836b7654ad03a09c8dbf35b8ad5d48ad58
-
SSDEEP
24576:CupRi52nSVkBIEWYzIDM6z185HhTD9Ctpr0hNSNV0M:C5VkB5oM7JBCtF9
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-