General
-
Target
203a1e6dfba46d8fa0ee9c61bff1552d_JaffaCakes118
-
Size
1.2MB
-
Sample
241008-hxbevsvbjn
-
MD5
203a1e6dfba46d8fa0ee9c61bff1552d
-
SHA1
8a6378edd890d2a4447ad29b50012940496bd2cf
-
SHA256
10a46ae388ed8008994e9f7ed9ee1c11206ef4572b4c29ed7a03733be48797e6
-
SHA512
b89c637af3c19a48ec7fe327ac6191854e4d2f8f4be6df724e7a38a95ba4874f90be05040f5a8b108d4cf8378de10001f6341bc92de3288c61554735c302ec12
-
SSDEEP
24576:mBLdexGREcLFvIrp+P87FFUhkJrwoWylXnUc:mBLd1RfvIrzF6KrwoWylkc
Static task
static1
Behavioral task
behavioral1
Sample
203a1e6dfba46d8fa0ee9c61bff1552d_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
latentbot
chaetlolilol.zapto.org
Targets
-
-
Target
203a1e6dfba46d8fa0ee9c61bff1552d_JaffaCakes118
-
Size
1.2MB
-
MD5
203a1e6dfba46d8fa0ee9c61bff1552d
-
SHA1
8a6378edd890d2a4447ad29b50012940496bd2cf
-
SHA256
10a46ae388ed8008994e9f7ed9ee1c11206ef4572b4c29ed7a03733be48797e6
-
SHA512
b89c637af3c19a48ec7fe327ac6191854e4d2f8f4be6df724e7a38a95ba4874f90be05040f5a8b108d4cf8378de10001f6341bc92de3288c61554735c302ec12
-
SSDEEP
24576:mBLdexGREcLFvIrp+P87FFUhkJrwoWylXnUc:mBLd1RfvIrzF6KrwoWylkc
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-