General
-
Target
5c0106271bdbd29ee14f145d87caa082_JaffaCakes118
-
Size
280KB
-
Sample
241019-lmk34ayhld
-
MD5
5c0106271bdbd29ee14f145d87caa082
-
SHA1
5e758d47f5fd4c8f6eb2fc1c039bc6d72e6241b9
-
SHA256
cacddf660daa544ed10b229c985b88e987b611bd5528b4bdb526809901cab5be
-
SHA512
a2fbb5511cbb31285019e6c0e23a021919026314fb32ba07a8d0318353d74ed5b6c510c7e186464513e56fe3078cc7b8a65c2f3499d104da05d6b915abf2025c
-
SSDEEP
6144:iwT5O7pJmNB6dLY6dCnnsyZLHoaIyv6ocU/qxDS2xDWb3cwEw4:iP+NULZdCn3TbncU2D7Ab3n4
Behavioral task
behavioral1
Sample
5c0106271bdbd29ee14f145d87caa082_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
darkcomet
Victim
ganjalife.no-ip.biz:1452
DC_MUTEX-JLZHKUJ
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
5sqvqmXgCKct
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
5c0106271bdbd29ee14f145d87caa082_JaffaCakes118
-
Size
280KB
-
MD5
5c0106271bdbd29ee14f145d87caa082
-
SHA1
5e758d47f5fd4c8f6eb2fc1c039bc6d72e6241b9
-
SHA256
cacddf660daa544ed10b229c985b88e987b611bd5528b4bdb526809901cab5be
-
SHA512
a2fbb5511cbb31285019e6c0e23a021919026314fb32ba07a8d0318353d74ed5b6c510c7e186464513e56fe3078cc7b8a65c2f3499d104da05d6b915abf2025c
-
SSDEEP
6144:iwT5O7pJmNB6dLY6dCnnsyZLHoaIyv6ocU/qxDS2xDWb3cwEw4:iP+NULZdCn3TbncU2D7Ab3n4
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1