General
-
Target
cdde04dcbb4608116a3f579c10ca05c2_JaffaCakes118
-
Size
1.1MB
-
Sample
241206-tg4bgsvras
-
MD5
cdde04dcbb4608116a3f579c10ca05c2
-
SHA1
b9eb3a0b4b57682ebd950b4418a240950850756b
-
SHA256
f88e0b67f660fac89b18d3fa165e105fd3293735a104fb2b2fc9e4fbc5e8ecc5
-
SHA512
42ec2ea0a0d058442391313fe3b6af0475380b676e47003c959b64d0262c1c3c3cc19111013b7dc1c2214d96606d2799ce540ca17733ea846e6eb40819b7916f
-
SSDEEP
24576:N8oVxVB6tm3C5pXIYpTBgrLaHu3Id66E3s97:N8IxL6VNSrLd3JNg
Static task
static1
Behavioral task
behavioral1
Sample
cdde04dcbb4608116a3f579c10ca05c2_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
danabot
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
Targets
-
-
Target
cdde04dcbb4608116a3f579c10ca05c2_JaffaCakes118
-
Size
1.1MB
-
MD5
cdde04dcbb4608116a3f579c10ca05c2
-
SHA1
b9eb3a0b4b57682ebd950b4418a240950850756b
-
SHA256
f88e0b67f660fac89b18d3fa165e105fd3293735a104fb2b2fc9e4fbc5e8ecc5
-
SHA512
42ec2ea0a0d058442391313fe3b6af0475380b676e47003c959b64d0262c1c3c3cc19111013b7dc1c2214d96606d2799ce540ca17733ea846e6eb40819b7916f
-
SSDEEP
24576:N8oVxVB6tm3C5pXIYpTBgrLaHu3Id66E3s97:N8IxL6VNSrLd3JNg
-
Danabot Loader Component
-
Danabot family
-
Blocklisted process makes network request
-
Loads dropped DLL
-