General
-
Target
JaffaCakes118_fc1189eca6c99ec90d71c2317c7c89b5c5d54dd5d378a57e50669849775f25e8
-
Size
45KB
-
Sample
241223-3rrj4svrhm
-
MD5
9c851b642e1e49781e2ce9eedb02ee64
-
SHA1
e22971a8700bf28867e744244474033d55143ee5
-
SHA256
fc1189eca6c99ec90d71c2317c7c89b5c5d54dd5d378a57e50669849775f25e8
-
SHA512
77696aaae1df81d5922ddf30a6df4fc8f1e3aacdb2884d1a55e8362315f6895c13394fc14723f2879a8848cf33ec235a5405841aed9450f15f515a251da6ebda
-
SSDEEP
768:buqg9T944nD5WUxiVDmo2qrjKjGKG6PIyzjbFgX3iSe8lUSoR29OAlpxyNmBDZrx:buqg9T9xy2uKYDy3bCXS+G38cApxhdrx
Behavioral task
behavioral1
Sample
JaffaCakes118_fc1189eca6c99ec90d71c2317c7c89b5c5d54dd5d378a57e50669849775f25e8.exe
Resource
win7-20241023-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:1604
127.0.0.1:14778
6.tcp.eu.ngrok.io:6606
6.tcp.eu.ngrok.io:7707
6.tcp.eu.ngrok.io:8808
6.tcp.eu.ngrok.io:1604
6.tcp.eu.ngrok.io:14778
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
123.exe
-
install_folder
%AppData%
Targets
-
-
Target
JaffaCakes118_fc1189eca6c99ec90d71c2317c7c89b5c5d54dd5d378a57e50669849775f25e8
-
Size
45KB
-
MD5
9c851b642e1e49781e2ce9eedb02ee64
-
SHA1
e22971a8700bf28867e744244474033d55143ee5
-
SHA256
fc1189eca6c99ec90d71c2317c7c89b5c5d54dd5d378a57e50669849775f25e8
-
SHA512
77696aaae1df81d5922ddf30a6df4fc8f1e3aacdb2884d1a55e8362315f6895c13394fc14723f2879a8848cf33ec235a5405841aed9450f15f515a251da6ebda
-
SSDEEP
768:buqg9T944nD5WUxiVDmo2qrjKjGKG6PIyzjbFgX3iSe8lUSoR29OAlpxyNmBDZrx:buqg9T9xy2uKYDy3bCXS+G38cApxhdrx
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-