General
-
Target
236b256c4b3847385c97017dc3e13321_JaffaCakes118
-
Size
1.2MB
-
Sample
241008-w2z6nsverd
-
MD5
236b256c4b3847385c97017dc3e13321
-
SHA1
0319e215cfbbeafece1ef4e53bf9ce51e236a7fc
-
SHA256
e1739818076bcd954349e8ff0aa465fd980781a9e73c5048864959e0a3ca77b1
-
SHA512
4752a892f2b5167832966a40ef88a31f57938a5453afb11ae48e55ed079eeaa6583f07a2303aae11166b94760a606dd671c10854ad867ea12be24d48c0b92740
-
SSDEEP
24576:7pqakfAoiWHIbsjF5nA2l7EuJeh9H3PshGsE0Z2rDK8:7Euo8OA2pBCE00ZAu8
Static task
static1
Behavioral task
behavioral1
Sample
236b256c4b3847385c97017dc3e13321_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
danabot
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
Targets
-
-
Target
236b256c4b3847385c97017dc3e13321_JaffaCakes118
-
Size
1.2MB
-
MD5
236b256c4b3847385c97017dc3e13321
-
SHA1
0319e215cfbbeafece1ef4e53bf9ce51e236a7fc
-
SHA256
e1739818076bcd954349e8ff0aa465fd980781a9e73c5048864959e0a3ca77b1
-
SHA512
4752a892f2b5167832966a40ef88a31f57938a5453afb11ae48e55ed079eeaa6583f07a2303aae11166b94760a606dd671c10854ad867ea12be24d48c0b92740
-
SSDEEP
24576:7pqakfAoiWHIbsjF5nA2l7EuJeh9H3PshGsE0Z2rDK8:7Euo8OA2pBCE00ZAu8
-
Danabot Loader Component
-
Blocklisted process makes network request
-
Loads dropped DLL
-