General
-
Target
40a2abd2611d198acd708cd37fa1373c_JaffaCakes118
-
Size
35KB
-
Sample
241013-sxjfkstdlc
-
MD5
40a2abd2611d198acd708cd37fa1373c
-
SHA1
803fcf9986e45851cc61cbdc9942eb10b1be7a97
-
SHA256
dc54c641c415c23c93da046eb314c746fcca5f82cd8a56970c1ebc4fabba1b16
-
SHA512
4bddd5515de541216b337f461c5e3481d7df383a1bf1d7b27e34ae0f5065d18df203bb585bd7563dea83bebad5939de1860f824cefc089032f7546fdc69a578a
-
SSDEEP
768:NqQoj/dSzNVQ1mDNJWbKEdBMQXQ3Cn4eQQDrcwxE:MQoj/YNJcAQDk
Static task
static1
Behavioral task
behavioral1
Sample
40a2abd2611d198acd708cd37fa1373c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
40a2abd2611d198acd708cd37fa1373c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Targets
-
-
Target
40a2abd2611d198acd708cd37fa1373c_JaffaCakes118
-
Size
35KB
-
MD5
40a2abd2611d198acd708cd37fa1373c
-
SHA1
803fcf9986e45851cc61cbdc9942eb10b1be7a97
-
SHA256
dc54c641c415c23c93da046eb314c746fcca5f82cd8a56970c1ebc4fabba1b16
-
SHA512
4bddd5515de541216b337f461c5e3481d7df383a1bf1d7b27e34ae0f5065d18df203bb585bd7563dea83bebad5939de1860f824cefc089032f7546fdc69a578a
-
SSDEEP
768:NqQoj/dSzNVQ1mDNJWbKEdBMQXQ3Cn4eQQDrcwxE:MQoj/YNJcAQDk
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-