General
-
Target
81d79aec6b1ae0890451f8f677fad3e6_JaffaCakes118
-
Size
241KB
-
Sample
241031-gepdbsspdn
-
MD5
81d79aec6b1ae0890451f8f677fad3e6
-
SHA1
57724cf76ea0bbd924d53de85481f1278f10d138
-
SHA256
c6d17cf0f462d539125b4abb7752e9dbd891a9159e52352dd77383a9300f8297
-
SHA512
2185094655d9ad2a5e26d5249de5fd608b6025c40fe2e108b59dfb835e770113a5e8c0ee82b3f94f774a45f787620d521d4ef5b065cbfc4bb38a50204724c2bb
-
SSDEEP
6144:t1iJcYtR1HsvpSHY7KoSrfTNBuzZZcA1wnOLrMM4y:tkHcpSHY7VSrfT2/czO3HL
Behavioral task
behavioral1
Sample
81d79aec6b1ae0890451f8f677fad3e6_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
81d79aec6b1ae0890451f8f677fad3e6_JaffaCakes118
-
Size
241KB
-
MD5
81d79aec6b1ae0890451f8f677fad3e6
-
SHA1
57724cf76ea0bbd924d53de85481f1278f10d138
-
SHA256
c6d17cf0f462d539125b4abb7752e9dbd891a9159e52352dd77383a9300f8297
-
SHA512
2185094655d9ad2a5e26d5249de5fd608b6025c40fe2e108b59dfb835e770113a5e8c0ee82b3f94f774a45f787620d521d4ef5b065cbfc4bb38a50204724c2bb
-
SSDEEP
6144:t1iJcYtR1HsvpSHY7KoSrfTNBuzZZcA1wnOLrMM4y:tkHcpSHY7VSrfT2/czO3HL
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-