General
-
Target
4cf74d9c5858ec807505f275a1c2233c_JaffaCakes118
-
Size
709KB
-
Sample
241016-p7adwa1ajc
-
MD5
4cf74d9c5858ec807505f275a1c2233c
-
SHA1
a562d3c4649db10641573fda70151c6e2a07ac24
-
SHA256
354d9c8829f6cec109e893dc0d508cb89255d50870b51fb7993e89dcd4f7e55f
-
SHA512
7fde6f1f9f3a571a8b5a08fba3ab363506c696e7ee681dc45de832097fbb2694fdc5a305867c15133d7bfd6f1d6f9c3630bc88a7eeafe66a1708ebba22280cbf
-
SSDEEP
12288:YMcUk+kRAc24fLzyxJc+N7z6dapztN29j2srAQaKKemQXYkHppp7ET:YXWk524DL07GdGq52MpKIXYkHpp
Static task
static1
Behavioral task
behavioral1
Sample
4cf74d9c5858ec807505f275a1c2233c_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
0708
ilogical.no-ip.org:1605
DC_MUTEX-F3JQ150
-
gencode
CLvz5adYp95V
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
4cf74d9c5858ec807505f275a1c2233c_JaffaCakes118
-
Size
709KB
-
MD5
4cf74d9c5858ec807505f275a1c2233c
-
SHA1
a562d3c4649db10641573fda70151c6e2a07ac24
-
SHA256
354d9c8829f6cec109e893dc0d508cb89255d50870b51fb7993e89dcd4f7e55f
-
SHA512
7fde6f1f9f3a571a8b5a08fba3ab363506c696e7ee681dc45de832097fbb2694fdc5a305867c15133d7bfd6f1d6f9c3630bc88a7eeafe66a1708ebba22280cbf
-
SSDEEP
12288:YMcUk+kRAc24fLzyxJc+N7z6dapztN29j2srAQaKKemQXYkHppp7ET:YXWk524DL07GdGq52MpKIXYkHpp
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-