General
-
Target
38b8ce3a565db4d804c7afef99f7b6d3_JaffaCakes118
-
Size
1.1MB
-
Sample
241012-gnycla1frk
-
MD5
38b8ce3a565db4d804c7afef99f7b6d3
-
SHA1
22d869edf7f9760668eb3c89494dc3895a416ec6
-
SHA256
b49b80f454063b976c97471ed7668ef31b95c97611b97c0eff87b0061048be7e
-
SHA512
72960e8b2793080d3fcfdbde30692d7264def82ccf6182850a62adaf8f6651781f59984228961e7968b2b6a0cad163175d60097ec8199666f9aa6070af1777af
-
SSDEEP
24576:TQ06qWLu4Cdk+4cHwZFcWUAVy6ZtUcnIh/Y:TLGCr4cHwY/yNIh/Y
Static task
static1
Behavioral task
behavioral1
Sample
38b8ce3a565db4d804c7afef99f7b6d3_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
danabot
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
Targets
-
-
Target
38b8ce3a565db4d804c7afef99f7b6d3_JaffaCakes118
-
Size
1.1MB
-
MD5
38b8ce3a565db4d804c7afef99f7b6d3
-
SHA1
22d869edf7f9760668eb3c89494dc3895a416ec6
-
SHA256
b49b80f454063b976c97471ed7668ef31b95c97611b97c0eff87b0061048be7e
-
SHA512
72960e8b2793080d3fcfdbde30692d7264def82ccf6182850a62adaf8f6651781f59984228961e7968b2b6a0cad163175d60097ec8199666f9aa6070af1777af
-
SSDEEP
24576:TQ06qWLu4Cdk+4cHwZFcWUAVy6ZtUcnIh/Y:TLGCr4cHwY/yNIh/Y
-
Blocklisted process makes network request
-
Loads dropped DLL
-