General
-
Target
c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118
-
Size
100KB
-
Sample
241204-1g66pssnc1
-
MD5
c47e756e3c153d0ddec6d27c7ede09a2
-
SHA1
43805115c3ff07c8eda4bef92e57904c11a1e5ac
-
SHA256
1e28928dbba0b860e22805a1d6a40c771ce1c975c1c0a9740adcf8f5010b9be2
-
SHA512
6f4e9300c0c360409ed55a6aa988b1a90f6077c4297df047feaa2a11d8117caf444a135c9ea301d22b0fd18d500d6aaf36aaed89c29b1283d041246ada0d071c
-
SSDEEP
1536:OgEs39DdAjgNuzCmH4Z2LKuRG/YI0ehne0SqA:9EodAjxmmCmzGwSne0XA
Static task
static1
Behavioral task
behavioral1
Sample
c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
latentbot
shootiemange.zapto.org
Targets
-
-
Target
c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118
-
Size
100KB
-
MD5
c47e756e3c153d0ddec6d27c7ede09a2
-
SHA1
43805115c3ff07c8eda4bef92e57904c11a1e5ac
-
SHA256
1e28928dbba0b860e22805a1d6a40c771ce1c975c1c0a9740adcf8f5010b9be2
-
SHA512
6f4e9300c0c360409ed55a6aa988b1a90f6077c4297df047feaa2a11d8117caf444a135c9ea301d22b0fd18d500d6aaf36aaed89c29b1283d041246ada0d071c
-
SSDEEP
1536:OgEs39DdAjgNuzCmH4Z2LKuRG/YI0ehne0SqA:9EodAjxmmCmzGwSne0XA
Score10/10-
Latentbot family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-