General
-
Target
2bacead73dde3c7e51b68340af645df1_JaffaCakes118
-
Size
365KB
-
Sample
241009-f46hgashnp
-
MD5
2bacead73dde3c7e51b68340af645df1
-
SHA1
f1d0d2bcd00cdeff0298281b3613a81b1a50e025
-
SHA256
5a3152db74b5749cac0edc405cc09977c236b5433349946233eeb6616ff6d1c9
-
SHA512
6eeeaa0d2e94c2f879463a7b6d3c259b2377f0802ff4d114394863137fce8f46073d92c883928368ec56b2c996b0a19f0816702121b272bdf10927ecc089c3e2
-
SSDEEP
6144:A74ulVbGPqrjBbBVDCcCVdKrLmzz03iU8dnH:A74GgP+dbTtCi/mJnH
Static task
static1
Behavioral task
behavioral1
Sample
2bacead73dde3c7e51b68340af645df1_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
64.44.167.67:6900
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
2bacead73dde3c7e51b68340af645df1_JaffaCakes118
-
Size
365KB
-
MD5
2bacead73dde3c7e51b68340af645df1
-
SHA1
f1d0d2bcd00cdeff0298281b3613a81b1a50e025
-
SHA256
5a3152db74b5749cac0edc405cc09977c236b5433349946233eeb6616ff6d1c9
-
SHA512
6eeeaa0d2e94c2f879463a7b6d3c259b2377f0802ff4d114394863137fce8f46073d92c883928368ec56b2c996b0a19f0816702121b272bdf10927ecc089c3e2
-
SSDEEP
6144:A74ulVbGPqrjBbBVDCcCVdKrLmzz03iU8dnH:A74GgP+dbTtCi/mJnH
-
Drops startup file
-
Suspicious use of SetThreadContext
-