General
-
Target
JaffaCakes118_2e6c8c289deb4e04aa77b08d453e8bb63ece89fa9311b7fdafb3f68ffba79992
-
Size
52KB
-
Sample
241226-w63scsvlam
-
MD5
c2045587eb9a245362b307c051c19bad
-
SHA1
3a15af68341d4ff08025a39dad92e67a5fafa687
-
SHA256
2e6c8c289deb4e04aa77b08d453e8bb63ece89fa9311b7fdafb3f68ffba79992
-
SHA512
a134351b54a80e81ca2247452913bd1a267e99ca2d5985d263958258851994581a366134c0167bee51680b0c02f04315fe0d8be053684ea3869c4ac767efed76
-
SSDEEP
768:Uq9SBya4007j7EtSLvbd1su8poO0AUYiKFLorJjICw91oAuUteKW5GQyhS4PCRXn:Uq9mya4087EEJ1aotYiIHCwgevQ6S8C9
Static task
static1
Behavioral task
behavioral1
Sample
EFT Payment Advice.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
EFT Payment Advice.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
EFT Payment Advice.bin
-
Size
128KB
-
MD5
1c4f0c8a3980ddb659d4ad8e91d7618d
-
SHA1
056cc5e13f2417bab9252d8119ac2bccfaee40fd
-
SHA256
7ff4fa75489bccc3b2530358950665e594636699d68c07eb742cba4e70a7668c
-
SHA512
5a55f59808e23ba7ed00f35ac64342d594987464a2a954107c5ecfe0b9c86eb6b58e3c18db95570a6d2c43877f199f986bb0f3a5a0190280b2a02b11019b79b2
-
SSDEEP
1536:JtTodMBHMVqPg0V9vCPuEfeuAdCA8KCkS88iFub:3pqkNV1CPuqend38bqs
Score10/10-
Guloader family
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-