General
-
Target
JaffaCakes118_bc2fde8d86c4308624e3ac07e9d1f7435e3b220380fc2763ab43b5eb8c22c2c8
-
Size
45KB
-
Sample
241224-tcdv2a1lgy
-
MD5
70ad7f173c8545db329659103e544d16
-
SHA1
785741ed4a6ecb0557a7005ba05cef553ee6bcb8
-
SHA256
bc2fde8d86c4308624e3ac07e9d1f7435e3b220380fc2763ab43b5eb8c22c2c8
-
SHA512
95fbed989354dd78f361776d8597306c41db1ee8b76f9796dc8a5846a47239b405e5b263314667638f7e014e7cb5d1470137b85f6cdf73a0b4f901a8956131a8
-
SSDEEP
768:buqg9T944nD5WUxiVDmo2qrjKjGKG6PIyzjbFgX3iHCVRVqYL2qFBDZrx:buqg9T9xy2uKYDy3bCXSiVRNfdrx
Behavioral task
behavioral1
Sample
JaffaCakes118_bc2fde8d86c4308624e3ac07e9d1f7435e3b220380fc2763ab43b5eb8c22c2c8.exe
Resource
win7-20241010-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:1604
127.0.0.1:16961
4.tcp.eu.ngrok.io:6606
4.tcp.eu.ngrok.io:7707
4.tcp.eu.ngrok.io:8808
4.tcp.eu.ngrok.io:1604
4.tcp.eu.ngrok.io:16961
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
123.exe
-
install_folder
%AppData%
Targets
-
-
Target
JaffaCakes118_bc2fde8d86c4308624e3ac07e9d1f7435e3b220380fc2763ab43b5eb8c22c2c8
-
Size
45KB
-
MD5
70ad7f173c8545db329659103e544d16
-
SHA1
785741ed4a6ecb0557a7005ba05cef553ee6bcb8
-
SHA256
bc2fde8d86c4308624e3ac07e9d1f7435e3b220380fc2763ab43b5eb8c22c2c8
-
SHA512
95fbed989354dd78f361776d8597306c41db1ee8b76f9796dc8a5846a47239b405e5b263314667638f7e014e7cb5d1470137b85f6cdf73a0b4f901a8956131a8
-
SSDEEP
768:buqg9T944nD5WUxiVDmo2qrjKjGKG6PIyzjbFgX3iHCVRVqYL2qFBDZrx:buqg9T9xy2uKYDy3bCXSiVRNfdrx
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-