General
-
Target
65b9586c393f9bdaa42fb520099b0420_JaffaCakes118
-
Size
3.2MB
-
Sample
241021-gj4nta1hpb
-
MD5
65b9586c393f9bdaa42fb520099b0420
-
SHA1
2c431c016140a4cd49064309092bba51bc99be97
-
SHA256
90171cf1eca6c3c50a2f099a4ac3507ee6ff857f18e16acf1ea7a63ecc9fea67
-
SHA512
9a8401cc9711e4d2641d21156baa18320370be201d8505a3aff4f04750c29da22cc74ef9fc43c20f694a8c952ee1e7278cb68f68189b872a64a78294d17c7478
-
SSDEEP
98304:QA5QUbKfX30pAJtS5AaA8Z/zZM1h5g+LtRgJ:sUmfX3AIt58Z/zm1Dg+LTgJ
Static task
static1
Behavioral task
behavioral1
Sample
65b9586c393f9bdaa42fb520099b0420_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
65b9586c393f9bdaa42fb520099b0420_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
65b9586c393f9bdaa42fb520099b0420_JaffaCakes118
-
Size
3.2MB
-
MD5
65b9586c393f9bdaa42fb520099b0420
-
SHA1
2c431c016140a4cd49064309092bba51bc99be97
-
SHA256
90171cf1eca6c3c50a2f099a4ac3507ee6ff857f18e16acf1ea7a63ecc9fea67
-
SHA512
9a8401cc9711e4d2641d21156baa18320370be201d8505a3aff4f04750c29da22cc74ef9fc43c20f694a8c952ee1e7278cb68f68189b872a64a78294d17c7478
-
SSDEEP
98304:QA5QUbKfX30pAJtS5AaA8Z/zZM1h5g+LtRgJ:sUmfX3AIt58Z/zm1Dg+LTgJ
-
Panda Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-