General
-
Target
20eb6b8655de71aad0ba6e71a045b1f6_JaffaCakes118
-
Size
2.6MB
-
Sample
241008-lw6q6azeqj
-
MD5
20eb6b8655de71aad0ba6e71a045b1f6
-
SHA1
1770246098ea07e2024dd31de0fba54916d7236b
-
SHA256
685933af075d310ddb454b399641cfdbf801441e5360df0e71204d63d2afc757
-
SHA512
bb6a8f071ca9d77ab6c10f90b3ba1ad1e86c7b326fa7731c13fde95554bba97cf374878a64a7ad4fec0aee3301751ab32d280a8c440aa78319fc89f5391f2259
-
SSDEEP
49152:pAI+mPQQSU9afXEDN50Qx8lMmD4gGovWhJLEx2BwDPw1V46hi5SC0DNdSM2SwMpt:pAI+M4UsuNxyvGoOnEx2BoQVlhi5S9OG
Static task
static1
Behavioral task
behavioral1
Sample
20eb6b8655de71aad0ba6e71a045b1f6_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
ffdroider
http://186.2.171.3
Targets
-
-
Target
20eb6b8655de71aad0ba6e71a045b1f6_JaffaCakes118
-
Size
2.6MB
-
MD5
20eb6b8655de71aad0ba6e71a045b1f6
-
SHA1
1770246098ea07e2024dd31de0fba54916d7236b
-
SHA256
685933af075d310ddb454b399641cfdbf801441e5360df0e71204d63d2afc757
-
SHA512
bb6a8f071ca9d77ab6c10f90b3ba1ad1e86c7b326fa7731c13fde95554bba97cf374878a64a7ad4fec0aee3301751ab32d280a8c440aa78319fc89f5391f2259
-
SSDEEP
49152:pAI+mPQQSU9afXEDN50Qx8lMmD4gGovWhJLEx2BwDPw1V46hi5SC0DNdSM2SwMpt:pAI+M4UsuNxyvGoOnEx2BoQVlhi5S9OG
-
FFDroider payload
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-