General
-
Target
5f9c73fe96d37486d0e375c1fa90435b_JaffaCakes118
-
Size
58KB
-
Sample
241020-bd9d8a1gmp
-
MD5
5f9c73fe96d37486d0e375c1fa90435b
-
SHA1
bfd201874003777d21b266aea0e2c0a58b95b136
-
SHA256
7384eeb77614edb477be24e3b91d93b30bcf092f3fe0a4b5b1a8096c8b6a54eb
-
SHA512
bb7f26a191d2d384e30d62a7ae38d835f662899066dd3970ea33f220be5e320ac977c3780a0597e0eef5340b0d5dd5460f1e4ae718c6a109a3f4f12c647a9b65
-
SSDEEP
1536:ouHT3E14wt7nouy804KAfWkZAPIhf0fjKwIt:ouz3ECOjout04KmWsAPIhMfuwIt
Behavioral task
behavioral1
Sample
5f9c73fe96d37486d0e375c1fa90435b_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
5f9c73fe96d37486d0e375c1fa90435b_JaffaCakes118
-
Size
58KB
-
MD5
5f9c73fe96d37486d0e375c1fa90435b
-
SHA1
bfd201874003777d21b266aea0e2c0a58b95b136
-
SHA256
7384eeb77614edb477be24e3b91d93b30bcf092f3fe0a4b5b1a8096c8b6a54eb
-
SHA512
bb7f26a191d2d384e30d62a7ae38d835f662899066dd3970ea33f220be5e320ac977c3780a0597e0eef5340b0d5dd5460f1e4ae718c6a109a3f4f12c647a9b65
-
SSDEEP
1536:ouHT3E14wt7nouy804KAfWkZAPIhf0fjKwIt:ouz3ECOjout04KmWsAPIhMfuwIt
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-