General
-
Target
20180a09bd56f0614df702155b59eb22_JaffaCakes118
-
Size
670KB
-
Sample
241008-hbpelaxanf
-
MD5
20180a09bd56f0614df702155b59eb22
-
SHA1
a965cd7150fb405653d59994344b4941c8fdf6be
-
SHA256
55b4dfd9f6a64f7a2b86033f0808e1850cebb5819e476e9dcd25d59bf09366c1
-
SHA512
c88387b6b9490cb13de28e04bbdabde9437c8ad27fb8c9ee5110ffe12180821bb5a0f4621fb80611e7bbc5b274124e2c94154ef570b8eaa48abf4e066acb87fb
-
SSDEEP
6144:F2n5g3PZMegQUFyGy+3Lg57V1OnheX88VVcPnxSXeqpZE4GRfKx/8GcsMBvMCmJO:F252EQUFuCgJ/s2q5Gep4E+esTCmfU
Static task
static1
Behavioral task
behavioral1
Sample
20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20180a09bd56f0614df702155b59eb22_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
netwire
centos4u.strangled.net:1337
centos44.myftp.biz:1337
-
activex_autorun
true
-
activex_key
{3G3GH5DC-0RYG-I32H-266Y-2RMB2EO7OHX0}
-
copy_executable
true
-
delete_original
false
-
host_id
ZOZO
-
install_path
%AppData%\Adobe\Firefox.exe
-
keylogger_dir
%AppData%\L0JJ\
-
lock_executable
true
-
mutex
RvPShIvm
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
Defenderss
-
use_mutex
true
Targets
-
-
Target
20180a09bd56f0614df702155b59eb22_JaffaCakes118
-
Size
670KB
-
MD5
20180a09bd56f0614df702155b59eb22
-
SHA1
a965cd7150fb405653d59994344b4941c8fdf6be
-
SHA256
55b4dfd9f6a64f7a2b86033f0808e1850cebb5819e476e9dcd25d59bf09366c1
-
SHA512
c88387b6b9490cb13de28e04bbdabde9437c8ad27fb8c9ee5110ffe12180821bb5a0f4621fb80611e7bbc5b274124e2c94154ef570b8eaa48abf4e066acb87fb
-
SSDEEP
6144:F2n5g3PZMegQUFyGy+3Lg57V1OnheX88VVcPnxSXeqpZE4GRfKx/8GcsMBvMCmJO:F252EQUFuCgJ/s2q5Gep4E+esTCmfU
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
NetWire RAT payload
-
ModiLoader Second Stage
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-