General
-
Target
96dffec06114e1e9683f91da818cd80e_JaffaCakes118
-
Size
792KB
-
Sample
241124-ymgf5asmcm
-
MD5
96dffec06114e1e9683f91da818cd80e
-
SHA1
cbb0e2434469e43544af1fac049531918b25cdb5
-
SHA256
ec63c6eddf5d4d50208b5c2f92455bbb0993282a13f37509cea96932613d19ad
-
SHA512
4de0c0edf7b4a521a7c758ac8fec06d2f553ba822d6de8bfaa9db83e05ac022075536645fa417245461ac2eda23e2a17e06a5113d5cc8873bb429fa9264f510a
-
SSDEEP
24576:S7Nk4f+n2GbgK2sRDkwwuJSwKytO/4iysJ2:Elr+9k/jyGg
Static task
static1
Behavioral task
behavioral1
Sample
96dffec06114e1e9683f91da818cd80e_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Akela
runescapedelay123.no-ip.org:1603
DC_MUTEX-GQ048QD
-
gencode
G4LP11EdBdi8
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
96dffec06114e1e9683f91da818cd80e_JaffaCakes118
-
Size
792KB
-
MD5
96dffec06114e1e9683f91da818cd80e
-
SHA1
cbb0e2434469e43544af1fac049531918b25cdb5
-
SHA256
ec63c6eddf5d4d50208b5c2f92455bbb0993282a13f37509cea96932613d19ad
-
SHA512
4de0c0edf7b4a521a7c758ac8fec06d2f553ba822d6de8bfaa9db83e05ac022075536645fa417245461ac2eda23e2a17e06a5113d5cc8873bb429fa9264f510a
-
SSDEEP
24576:S7Nk4f+n2GbgK2sRDkwwuJSwKytO/4iysJ2:Elr+9k/jyGg
-
Darkcomet family
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-