General
-
Target
96f22769ad18a62a9aa16e275ae76ceb_JaffaCakes118
-
Size
603KB
-
Sample
241124-yxjn8stjdq
-
MD5
96f22769ad18a62a9aa16e275ae76ceb
-
SHA1
3df2efa1760b489ffd4d87c035829ee6fc1494ef
-
SHA256
8423a3e01e4aae1a0e97a300e5761acaf5cce69c6c699e4c66c4766ec889afa3
-
SHA512
4a20b840946fb97a8eb9a64287e5df6dbb98f8688ed81575da040e682d61c60ae9a8907dae200441aa431b45e0cc31b5f2d2f2964b2a42fa683a33bb01cd32c0
-
SSDEEP
12288:mNdxlPSzIeuLvUeB285FVEQpljNciL9+MkIsfDtHuUTpYxHMG:mNdx3LvpjFOISiMI0tt4HMG
Static task
static1
Behavioral task
behavioral1
Sample
96f22769ad18a62a9aa16e275ae76ceb_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
gspike
neo285.no-ip.org:200
DC_MUTEX-XVT3ZME
-
gencode
GuaxUHMQoViE
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
96f22769ad18a62a9aa16e275ae76ceb_JaffaCakes118
-
Size
603KB
-
MD5
96f22769ad18a62a9aa16e275ae76ceb
-
SHA1
3df2efa1760b489ffd4d87c035829ee6fc1494ef
-
SHA256
8423a3e01e4aae1a0e97a300e5761acaf5cce69c6c699e4c66c4766ec889afa3
-
SHA512
4a20b840946fb97a8eb9a64287e5df6dbb98f8688ed81575da040e682d61c60ae9a8907dae200441aa431b45e0cc31b5f2d2f2964b2a42fa683a33bb01cd32c0
-
SSDEEP
12288:mNdxlPSzIeuLvUeB285FVEQpljNciL9+MkIsfDtHuUTpYxHMG:mNdx3LvpjFOISiMI0tt4HMG
-
Darkcomet family
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-