General
-
Target
JaffaCakes118_cae2fb48c8bf03017b0d8321e79b3ac3209887eb77658e617c63f63a6f14f181
-
Size
1.3MB
-
Sample
241224-xj16patqd1
-
MD5
c59d7f337636c78922afc92241bca86e
-
SHA1
2712b3245ff84f49e72dde931f71d54a05539770
-
SHA256
cae2fb48c8bf03017b0d8321e79b3ac3209887eb77658e617c63f63a6f14f181
-
SHA512
7526e6f6a6acc7b8baa16fec29e8c7ba05b5b1049f2951ef44489251b00e2c969e92d9c42c9b5be3ce273f6a42feebcba8605bcff068b7309e79b6801d5f57a7
-
SSDEEP
12288:yrnjoa5ynWZQzjFeM6DJOjB9sTTHyzhYxwEf4N1gd2vnjc+Wk7pY9gfEqCO:VnYQb6VOp6wYQFEw
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_cae2fb48c8bf03017b0d8321e79b3ac3209887eb77658e617c63f63a6f14f181.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_cae2fb48c8bf03017b0d8321e79b3ac3209887eb77658e617c63f63a6f14f181.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
1.0.7
Default
carlosmenguallora09.duckdns.org:1994
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
JaffaCakes118_cae2fb48c8bf03017b0d8321e79b3ac3209887eb77658e617c63f63a6f14f181
-
Size
1.3MB
-
MD5
c59d7f337636c78922afc92241bca86e
-
SHA1
2712b3245ff84f49e72dde931f71d54a05539770
-
SHA256
cae2fb48c8bf03017b0d8321e79b3ac3209887eb77658e617c63f63a6f14f181
-
SHA512
7526e6f6a6acc7b8baa16fec29e8c7ba05b5b1049f2951ef44489251b00e2c969e92d9c42c9b5be3ce273f6a42feebcba8605bcff068b7309e79b6801d5f57a7
-
SSDEEP
12288:yrnjoa5ynWZQzjFeM6DJOjB9sTTHyzhYxwEf4N1gd2vnjc+Wk7pY9gfEqCO:VnYQb6VOp6wYQFEw
Score10/10-
Asyncrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-