General
-
Target
7b824e5d964fc615c9d499d3df4cb7fa_JaffaCakes118
-
Size
155KB
-
Sample
241029-cy53za1jdx
-
MD5
7b824e5d964fc615c9d499d3df4cb7fa
-
SHA1
ffa0e0b22ba2a76473cb07a7d2e2b8e5559a49c5
-
SHA256
eec58cff377da4fe37b2338f82921d19f157aa88fd7cbe547ae51e75d690121f
-
SHA512
4a87db8f9d0fdc9d556b9470f900328b5565fe771aee2152ce73d7aaffa4fb71da0f51d96dd3d5b51898277b04c5ce879b99dc84be57f6c0330816c11a00d8c1
-
SSDEEP
3072:6BQAX4A71Gx3nr5aI+xk4UytHGyqXD0n8HbB3:6zGVnr5X+bHiXgns
Static task
static1
Behavioral task
behavioral1
Sample
7b824e5d964fc615c9d499d3df4cb7fa_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7b824e5d964fc615c9d499d3df4cb7fa_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
latentbot
established.zapto.org
Targets
-
-
Target
7b824e5d964fc615c9d499d3df4cb7fa_JaffaCakes118
-
Size
155KB
-
MD5
7b824e5d964fc615c9d499d3df4cb7fa
-
SHA1
ffa0e0b22ba2a76473cb07a7d2e2b8e5559a49c5
-
SHA256
eec58cff377da4fe37b2338f82921d19f157aa88fd7cbe547ae51e75d690121f
-
SHA512
4a87db8f9d0fdc9d556b9470f900328b5565fe771aee2152ce73d7aaffa4fb71da0f51d96dd3d5b51898277b04c5ce879b99dc84be57f6c0330816c11a00d8c1
-
SSDEEP
3072:6BQAX4A71Gx3nr5aI+xk4UytHGyqXD0n8HbB3:6zGVnr5X+bHiXgns
Score10/10-
Latentbot family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-