General
-
Target
JaffaCakes118_6334ff192eab8570d7309b9116a8b995
-
Size
511KB
-
Sample
250102-g6wxgsxphx
-
MD5
6334ff192eab8570d7309b9116a8b995
-
SHA1
c356ffcb58e1739bee3dc7ce45b41a195621912b
-
SHA256
0c411ca4bc46fdab13e4f2afcc3b6eb65989d7ba92786cb033b6c98956688fd1
-
SHA512
8061170cafc423e5de511d33f9eec42d99faf036b2f2ba8a7c5fb11835637d70c5714b0bcb1406221a013cdcad1647ff0f32ca45406e99efab9712044ff22cac
-
SSDEEP
12288:SBcdKoORknLPthaVpl0nOGFQu6b5K+SMoS:SiygvaynFQpN
Behavioral task
behavioral1
Sample
JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
JaffaCakes118_6334ff192eab8570d7309b9116a8b995
-
Size
511KB
-
MD5
6334ff192eab8570d7309b9116a8b995
-
SHA1
c356ffcb58e1739bee3dc7ce45b41a195621912b
-
SHA256
0c411ca4bc46fdab13e4f2afcc3b6eb65989d7ba92786cb033b6c98956688fd1
-
SHA512
8061170cafc423e5de511d33f9eec42d99faf036b2f2ba8a7c5fb11835637d70c5714b0bcb1406221a013cdcad1647ff0f32ca45406e99efab9712044ff22cac
-
SSDEEP
12288:SBcdKoORknLPthaVpl0nOGFQu6b5K+SMoS:SiygvaynFQpN
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-