General
-
Target
3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118
-
Size
1.0MB
-
Sample
241012-qma1caxark
-
MD5
3a3c0aa36c23d1ce82b90aa8a4826fc8
-
SHA1
0b1f693df6ff30fdeb04af20c2ec681cb3976a94
-
SHA256
b410782c26bec5ad3281f196e9ff3546be1f8394b9eadd81a7de5758286f0a36
-
SHA512
92823824ed526187d8872aab92e6cafaba8b55250b94c4b946baf75f216e363c6f0d383ac402441583580df481801696c56961714f8068c13c8643fe1419ca40
-
SSDEEP
24576:z8Evfhntxi7mrFhQ8ehkIRxgt4GZtZmWS:44txi7mr4/dRDGZLLS
Static task
static1
Behavioral task
behavioral1
Sample
3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
darkcomet
Guest16
rattingorger.zapto.org:1604
pr0h4xx.no-ip.biz:4444
DC_MUTEX-3A9SY2R
-
gencode
kZWyZl8DWoeE
-
install
false
-
offline_keylogger
true
-
persistence
false
Extracted
latentbot
rattingorger.zapto.org
Targets
-
-
Target
3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118
-
Size
1.0MB
-
MD5
3a3c0aa36c23d1ce82b90aa8a4826fc8
-
SHA1
0b1f693df6ff30fdeb04af20c2ec681cb3976a94
-
SHA256
b410782c26bec5ad3281f196e9ff3546be1f8394b9eadd81a7de5758286f0a36
-
SHA512
92823824ed526187d8872aab92e6cafaba8b55250b94c4b946baf75f216e363c6f0d383ac402441583580df481801696c56961714f8068c13c8643fe1419ca40
-
SSDEEP
24576:z8Evfhntxi7mrFhQ8ehkIRxgt4GZtZmWS:44txi7mr4/dRDGZLLS
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-