General
-
Target
bdc533020cedadeef328b0356357e3ed_JaffaCakes118
-
Size
1.3MB
-
Sample
241203-rkyt3atrar
-
MD5
bdc533020cedadeef328b0356357e3ed
-
SHA1
ec2fcae1c1757de2e7bbb575fd5272b1504f26e2
-
SHA256
b76b4117dcde1bf0f99b8c3c5e31fa4bc937e137d44fd6f8db6ed5fe7f97fc64
-
SHA512
1d6282d490473f3b6e8c632a49aeb9c0f3695b6cdffb18b6e6f96d88b51eb0cb5e181ff559720bd24f97e9ebfd51c85a3da31f63ec039ccf7c95aa6aafd1ec5c
-
SSDEEP
24576:FcFXBQxFG8IUrRMB2Bz7OPZk4Cu0eTrkyuw:mcC53LP+4C8Toyl
Behavioral task
behavioral1
Sample
bdc533020cedadeef328b0356357e3ed_JaffaCakes118.dll
Resource
win7-20240903-en
Malware Config
Extracted
danabot
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
Targets
-
-
Target
bdc533020cedadeef328b0356357e3ed_JaffaCakes118
-
Size
1.3MB
-
MD5
bdc533020cedadeef328b0356357e3ed
-
SHA1
ec2fcae1c1757de2e7bbb575fd5272b1504f26e2
-
SHA256
b76b4117dcde1bf0f99b8c3c5e31fa4bc937e137d44fd6f8db6ed5fe7f97fc64
-
SHA512
1d6282d490473f3b6e8c632a49aeb9c0f3695b6cdffb18b6e6f96d88b51eb0cb5e181ff559720bd24f97e9ebfd51c85a3da31f63ec039ccf7c95aa6aafd1ec5c
-
SSDEEP
24576:FcFXBQxFG8IUrRMB2Bz7OPZk4Cu0eTrkyuw:mcC53LP+4C8Toyl
-
Danabot Loader Component
-
Danabot family
-
Blocklisted process makes network request
-