General
-
Target
f5b733ac366300ec5a5b25f071da4cb9_JaffaCakes118
-
Size
1.3MB
-
Sample
241215-zr243aylep
-
MD5
f5b733ac366300ec5a5b25f071da4cb9
-
SHA1
5baf27d568546d6ee34426dce6670e9704ba54a6
-
SHA256
48e804ac750259deb34ddfc9f2d455a526cd52b7a71d0d34c71b8681947b8e67
-
SHA512
f04a53c0dddf67e50ecadc55e86cdc90ec16e7167cc6a17335b1708c56d97ef4de8f3e9e5e6a0c287359b4a52fd4e0534367ea6d909b16654cf51577a5ea00e7
-
SSDEEP
24576:RRmJkcoQricOIQxiZY1WNDfDcHVzJ1C8XSWJoISzLjq4NOKORwiI:eJZoQrbTFZY1WNDfg1zXmdz35NPOR7I
Static task
static1
Behavioral task
behavioral1
Sample
f5b733ac366300ec5a5b25f071da4cb9_JaffaCakes118.exe
Resource
win7-20241023-en
Malware Config
Extracted
darkcomet
Razor
rangerz.no-ip.biz:82
DC_MUTEX-NKD4VVL
-
gencode
bW5ZqmDdgC5h
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
f5b733ac366300ec5a5b25f071da4cb9_JaffaCakes118
-
Size
1.3MB
-
MD5
f5b733ac366300ec5a5b25f071da4cb9
-
SHA1
5baf27d568546d6ee34426dce6670e9704ba54a6
-
SHA256
48e804ac750259deb34ddfc9f2d455a526cd52b7a71d0d34c71b8681947b8e67
-
SHA512
f04a53c0dddf67e50ecadc55e86cdc90ec16e7167cc6a17335b1708c56d97ef4de8f3e9e5e6a0c287359b4a52fd4e0534367ea6d909b16654cf51577a5ea00e7
-
SSDEEP
24576:RRmJkcoQricOIQxiZY1WNDfDcHVzJ1C8XSWJoISzLjq4NOKORwiI:eJZoQrbTFZY1WNDfg1zXmdz35NPOR7I
-
Darkcomet family
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-