General
-
Target
JaffaCakes118_777a952f66baa34bde02c6075430a407
-
Size
50KB
-
Sample
250104-ehrxhssnhm
-
MD5
777a952f66baa34bde02c6075430a407
-
SHA1
e737be56566ab4f09abcf8988220f0517834851d
-
SHA256
6143e80d28f382ac57c41eeab350f8be0e88f642211ae1726538685eb0686aa9
-
SHA512
b707be23a181518d4a318101e8b5dc04dba26949cc2e743e50f054eefffdc0585a9a8502719f732d1855a841735771d43717ff4611b36d6a27598235f3023402
-
SSDEEP
768:f95geQCs3gOm6tiJSaZok3PRBX4fIOJaWm+YrEGMlc9OtwCvU062:fQe3sQMtBa+y5OsWm+Ygz20v
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_777a952f66baa34bde02c6075430a407.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
192.168.137.247:6606
192.168.137.247:7707
192.168.137.247:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
JaffaCakes118_777a952f66baa34bde02c6075430a407
-
Size
50KB
-
MD5
777a952f66baa34bde02c6075430a407
-
SHA1
e737be56566ab4f09abcf8988220f0517834851d
-
SHA256
6143e80d28f382ac57c41eeab350f8be0e88f642211ae1726538685eb0686aa9
-
SHA512
b707be23a181518d4a318101e8b5dc04dba26949cc2e743e50f054eefffdc0585a9a8502719f732d1855a841735771d43717ff4611b36d6a27598235f3023402
-
SSDEEP
768:f95geQCs3gOm6tiJSaZok3PRBX4fIOJaWm+YrEGMlc9OtwCvU062:fQe3sQMtBa+y5OsWm+Ygz20v
-
Asyncrat family
-
Async RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-