General
-
Target
ec2193e0b1f7d9cd55791f15dcab3594_JaffaCakes118
-
Size
416KB
-
Sample
241213-sqqw3ssmht
-
MD5
ec2193e0b1f7d9cd55791f15dcab3594
-
SHA1
5f4f7f432828491c79bd05b73f6390758b8ca4f4
-
SHA256
db3548188e4bd87806b34a7f13098429ac8b9ad4c700879cb198cbcffa835d0c
-
SHA512
8ee46c77be0bc2a4559cf31a7c6471e20d976b8793f2f99590a854a5cf94c6732935a962a32a2f4b0fd6dd0d4b035a8124b9b5c7f06376b7a38cc8d7ee2b84a6
-
SSDEEP
6144:R2G15aDfcPENBatRyCUF+P5ZGvWR8hq5tkDcFHm393/afc:ycPENuP5OQ84zwcFoCf
Static task
static1
Behavioral task
behavioral1
Sample
ec2193e0b1f7d9cd55791f15dcab3594_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
trickbot
1000195
tt0002
208.75.117.70:449
92.55.251.211:449
118.91.178.139:449
94.112.52.197:449
176.100.210.25:449
138.34.29.172:443
209.121.142.202:449
5.102.177.205:449
209.121.142.214:449
95.161.180.42:449
203.86.222.142:443
46.20.207.204:443
68.96.73.154:449
185.42.192.194:449
68.227.31.46:449
107.144.49.162:443
46.72.175.17:449
144.48.51.8:443
46.243.179.212:449
81.177.255.76:449
185.249.255.77:443
80.93.182.201:443
37.230.116.87:443
217.107.34.21:443
217.107.34.6:443
82.146.58.155:443
195.54.162.116:443
80.87.195.247:443
185.174.172.42:443
37.46.134.142:443
62.109.18.210:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Targets
-
-
Target
ec2193e0b1f7d9cd55791f15dcab3594_JaffaCakes118
-
Size
416KB
-
MD5
ec2193e0b1f7d9cd55791f15dcab3594
-
SHA1
5f4f7f432828491c79bd05b73f6390758b8ca4f4
-
SHA256
db3548188e4bd87806b34a7f13098429ac8b9ad4c700879cb198cbcffa835d0c
-
SHA512
8ee46c77be0bc2a4559cf31a7c6471e20d976b8793f2f99590a854a5cf94c6732935a962a32a2f4b0fd6dd0d4b035a8124b9b5c7f06376b7a38cc8d7ee2b84a6
-
SSDEEP
6144:R2G15aDfcPENBatRyCUF+P5ZGvWR8hq5tkDcFHm393/afc:ycPENuP5OQ84zwcFoCf
-
Trickbot family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-