General
-
Target
6a44fe87f200b6d088283bcb8a09de60_JaffaCakes118
-
Size
437KB
-
Sample
241022-nl6phsvcnp
-
MD5
6a44fe87f200b6d088283bcb8a09de60
-
SHA1
85ee7aead8cdf3188ab557fa3d1646dabbee5cfa
-
SHA256
a0c67599cbd0895731e75614ab9ac96885eef66f27b917ec9092ea276c9b863e
-
SHA512
c6ba6f9a3b96135c22393ec65b63a6884150cb1dcaa7373d8b63887f80154d292707ecbb8151535796502e3481dc5d93a31cb2b3510c8fa12e1fe9e30f806851
-
SSDEEP
12288:XAGAViwM6nkT4EqyV9iUdp3cxsdYponS:Q3guxsmOnS
Static task
static1
Behavioral task
behavioral1
Sample
6a44fe87f200b6d088283bcb8a09de60_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
darkcomet
NewDC
testiphone.no-ip.biz:84
DC_MUTEX-XCEQFST
-
gencode
6czE5EXKN81j
-
install
false
-
offline_keylogger
false
-
password
motdepasse
-
persistence
false
Targets
-
-
Target
6a44fe87f200b6d088283bcb8a09de60_JaffaCakes118
-
Size
437KB
-
MD5
6a44fe87f200b6d088283bcb8a09de60
-
SHA1
85ee7aead8cdf3188ab557fa3d1646dabbee5cfa
-
SHA256
a0c67599cbd0895731e75614ab9ac96885eef66f27b917ec9092ea276c9b863e
-
SHA512
c6ba6f9a3b96135c22393ec65b63a6884150cb1dcaa7373d8b63887f80154d292707ecbb8151535796502e3481dc5d93a31cb2b3510c8fa12e1fe9e30f806851
-
SSDEEP
12288:XAGAViwM6nkT4EqyV9iUdp3cxsdYponS:Q3guxsmOnS
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-