General
-
Target
f41c8229b3c54c3ff51191372d9cb790_JaffaCakes118
-
Size
111KB
-
Sample
241215-p7q2mavkfv
-
MD5
f41c8229b3c54c3ff51191372d9cb790
-
SHA1
c4d57e6f2b94060a94c4f84863a597c2ef58651d
-
SHA256
61b69d2a4ca9404f1a5b73fac4790b0a41c7c7f766ba90d5a459612b629bf9b1
-
SHA512
df6fd5888700d5acc5988821087c7a304e1ceff914320342dd1393f0366c6995828ffd9a82a36b029452215815fdb42e7c7aa9972ef16099fec7d7926a5f6c11
-
SSDEEP
1536:eR+7RKzXHFJOgDmUiApuj9bcqRaJB2d+JutQNGKZPPXveSxIYjT:eRSKzXlkgC7AKgJSCAY/
Static task
static1
Behavioral task
behavioral1
Sample
f41c8229b3c54c3ff51191372d9cb790_JaffaCakes118.js
Resource
win7-20241023-en
Malware Config
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/G9wX4J5m
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Targets
-
-
Target
f41c8229b3c54c3ff51191372d9cb790_JaffaCakes118
-
Size
111KB
-
MD5
f41c8229b3c54c3ff51191372d9cb790
-
SHA1
c4d57e6f2b94060a94c4f84863a597c2ef58651d
-
SHA256
61b69d2a4ca9404f1a5b73fac4790b0a41c7c7f766ba90d5a459612b629bf9b1
-
SHA512
df6fd5888700d5acc5988821087c7a304e1ceff914320342dd1393f0366c6995828ffd9a82a36b029452215815fdb42e7c7aa9972ef16099fec7d7926a5f6c11
-
SSDEEP
1536:eR+7RKzXHFJOgDmUiApuj9bcqRaJB2d+JutQNGKZPPXveSxIYjT:eRSKzXlkgC7AKgJSCAY/
-
Limerat family
-
Vjw0rm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1