General
-
Target
JaffaCakes118_688e51cc99c0019bf2553f5c035ce6ca
-
Size
658KB
-
Sample
250102-18fsts1lcj
-
MD5
688e51cc99c0019bf2553f5c035ce6ca
-
SHA1
d97eedb47c2c6777c6aefbdd8e0e22d374b4cc39
-
SHA256
7e33a1dc301e487bff78f9a7e64417dda4a57b57c70029c65075109fdd271639
-
SHA512
822c7db5a1e9b4b44f95302b6c7eb451c83da331440ac04938f64b99bc8142a03868d10ab5c3cd1a74f532a192ef10e10cab84dd412eaaa0137fd382e205afd2
-
SSDEEP
12288:x9AFlAd0Z+89cxTGzO4AucTD8QP2lmFSrVs9LqnKVL:HAQ6Zx9cxTmOrucTIEFSpOGEL
Behavioral task
behavioral1
Sample
JaffaCakes118_688e51cc99c0019bf2553f5c035ce6ca.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_688e51cc99c0019bf2553f5c035ce6ca
-
Size
658KB
-
MD5
688e51cc99c0019bf2553f5c035ce6ca
-
SHA1
d97eedb47c2c6777c6aefbdd8e0e22d374b4cc39
-
SHA256
7e33a1dc301e487bff78f9a7e64417dda4a57b57c70029c65075109fdd271639
-
SHA512
822c7db5a1e9b4b44f95302b6c7eb451c83da331440ac04938f64b99bc8142a03868d10ab5c3cd1a74f532a192ef10e10cab84dd412eaaa0137fd382e205afd2
-
SSDEEP
12288:x9AFlAd0Z+89cxTGzO4AucTD8QP2lmFSrVs9LqnKVL:HAQ6Zx9cxTmOrucTIEFSpOGEL
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-