General
-
Target
JaffaCakes118_9a108a80f5b5b3894ff5fdd573b626fdce87e467814c769382b8d9ab6c7d6997
-
Size
300.0MB
-
Sample
241224-zs2vpaxkhx
-
MD5
09d3660e122050f7daeef7650eaf4d5f
-
SHA1
485b17fdead4fd0917266739f905593d8d82bb43
-
SHA256
9a108a80f5b5b3894ff5fdd573b626fdce87e467814c769382b8d9ab6c7d6997
-
SHA512
a6d83a17d34c3050e957bb4f9d0d672b0ea9c129377e0ed0409a75f8d73cb4ad7368f076a5b303805a6a734e3ad6098003b570de60702ef498d62880382452ec
-
SSDEEP
3145728:ex1MFn6eC4YVC4m5oih6p7UUUUUMMTeD9GGtg:Gm5osTj5
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9a108a80f5b5b3894ff5fdd573b626fdce87e467814c769382b8d9ab6c7d6997.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9a108a80f5b5b3894ff5fdd573b626fdce87e467814c769382b8d9ab6c7d6997.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
VenomRAT 5.0.3
FEB-25-FRI
feb23-pandor.duckdns.org:25045
we4320fmef
-
delay
0
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
JaffaCakes118_9a108a80f5b5b3894ff5fdd573b626fdce87e467814c769382b8d9ab6c7d6997
-
Size
300.0MB
-
MD5
09d3660e122050f7daeef7650eaf4d5f
-
SHA1
485b17fdead4fd0917266739f905593d8d82bb43
-
SHA256
9a108a80f5b5b3894ff5fdd573b626fdce87e467814c769382b8d9ab6c7d6997
-
SHA512
a6d83a17d34c3050e957bb4f9d0d672b0ea9c129377e0ed0409a75f8d73cb4ad7368f076a5b303805a6a734e3ad6098003b570de60702ef498d62880382452ec
-
SSDEEP
3145728:ex1MFn6eC4YVC4m5oih6p7UUUUUMMTeD9GGtg:Gm5osTj5
Score10/10-
Asyncrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-