General
-
Target
d6f331b305bc66572c85e10079c0e4e6_JaffaCakes118
-
Size
756KB
-
Sample
241208-n7tl3sxpel
-
MD5
d6f331b305bc66572c85e10079c0e4e6
-
SHA1
2b336a00f86cc283b37f7d0204aebc213f3f3c82
-
SHA256
dea76f2467756acdf1f64d38ff05ed11c7bf0367bec6cfc601d060a0c7c4f3e2
-
SHA512
a51b05173f0eeaf7728cfc32e1e66354683c18468f5dd78d40e73f1c05556a2ef06d4759c3576ae045b81b890917f3a04e6c134543b667b9d236cab0f4c913f0
-
SSDEEP
12288:weyw32V3pZtlqF0aiLkxZieB+1TBRQmwXwL5tC36U/+NmYyhWTK:3+V3pZtlqmapZieBQNRDwgVU5ymYyhW+
Static task
static1
Behavioral task
behavioral1
Sample
d6f331b305bc66572c85e10079c0e4e6_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
d6f331b305bc66572c85e10079c0e4e6_JaffaCakes118
-
Size
756KB
-
MD5
d6f331b305bc66572c85e10079c0e4e6
-
SHA1
2b336a00f86cc283b37f7d0204aebc213f3f3c82
-
SHA256
dea76f2467756acdf1f64d38ff05ed11c7bf0367bec6cfc601d060a0c7c4f3e2
-
SHA512
a51b05173f0eeaf7728cfc32e1e66354683c18468f5dd78d40e73f1c05556a2ef06d4759c3576ae045b81b890917f3a04e6c134543b667b9d236cab0f4c913f0
-
SSDEEP
12288:weyw32V3pZtlqF0aiLkxZieB+1TBRQmwXwL5tC36U/+NmYyhWTK:3+V3pZtlqmapZieBQNRDwgVU5ymYyhW+
-
Cybergate family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Molebox Virtualization software
Detects file using Molebox Virtualization software.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-