General
-
Target
82397e61d9b5eda38cebb93da544a9da_JaffaCakes118
-
Size
43KB
-
Sample
241031-h5c9es1qdy
-
MD5
82397e61d9b5eda38cebb93da544a9da
-
SHA1
5534c45b28462525d23dd3829793a93bb52a5eae
-
SHA256
f61b5c1c425d49a70487f13f500b96384bd058af7005f977a12e6d7bb31a4ba0
-
SHA512
e74abfe0a749d7fd4ef5fdb727177498522c0e58d9bee5c87f084ad3fed1e538b45a4917b44bf85933ad6f93081b3957b8d712de59c6269b52896e8cc60d258e
-
SSDEEP
768:SRoS5Gcu6KDBZGvXVoc7vwFrbxazHs1W498cIOEDAF54:SRPMNGfVoevwlbxEs1WRcIjf
Behavioral task
behavioral1
Sample
82397e61d9b5eda38cebb93da544a9da_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
82397e61d9b5eda38cebb93da544a9da_JaffaCakes118
-
Size
43KB
-
MD5
82397e61d9b5eda38cebb93da544a9da
-
SHA1
5534c45b28462525d23dd3829793a93bb52a5eae
-
SHA256
f61b5c1c425d49a70487f13f500b96384bd058af7005f977a12e6d7bb31a4ba0
-
SHA512
e74abfe0a749d7fd4ef5fdb727177498522c0e58d9bee5c87f084ad3fed1e538b45a4917b44bf85933ad6f93081b3957b8d712de59c6269b52896e8cc60d258e
-
SSDEEP
768:SRoS5Gcu6KDBZGvXVoc7vwFrbxazHs1W498cIOEDAF54:SRPMNGfVoevwlbxEs1WRcIjf
-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-