General
-
Target
da3810fdce0451114fe0141f95d1096c_JaffaCakes118
-
Size
1.1MB
-
Sample
241209-shrteawpgn
-
MD5
da3810fdce0451114fe0141f95d1096c
-
SHA1
2aa5df30ccf05bbdc1712649e4354c7ab774b44d
-
SHA256
7426c53b7dedc077dba1ce6907e9d7765befd6cf828a9d89915a5b8a1efa4d9c
-
SHA512
33151530bdb4f39279c0fddfbd06fd10bb82677645fafb24cb007596ccda6f7b1b49a7efebc8e2423189c8b4de46f1b371220233da0faddb0efb6a23aa936245
-
SSDEEP
24576:92BslyAfUL3ZsM6Ugnpk/TZg8/zCAqqzSsQkkbQ3I:XlXU6zcR/zbqKSsQxF
Static task
static1
Behavioral task
behavioral1
Sample
da3810fdce0451114fe0141f95d1096c_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Extracted
danabot
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
Targets
-
-
Target
da3810fdce0451114fe0141f95d1096c_JaffaCakes118
-
Size
1.1MB
-
MD5
da3810fdce0451114fe0141f95d1096c
-
SHA1
2aa5df30ccf05bbdc1712649e4354c7ab774b44d
-
SHA256
7426c53b7dedc077dba1ce6907e9d7765befd6cf828a9d89915a5b8a1efa4d9c
-
SHA512
33151530bdb4f39279c0fddfbd06fd10bb82677645fafb24cb007596ccda6f7b1b49a7efebc8e2423189c8b4de46f1b371220233da0faddb0efb6a23aa936245
-
SSDEEP
24576:92BslyAfUL3ZsM6Ugnpk/TZg8/zCAqqzSsQkkbQ3I:XlXU6zcR/zbqKSsQxF
-
Danabot Loader Component
-
Danabot family
-
Blocklisted process makes network request
-
Loads dropped DLL
-