General
-
Target
JaffaCakes118_e1acbd5a6f99723b593c01d66db26b8d
-
Size
1.1MB
-
Sample
250110-l97kls1paz
-
MD5
e1acbd5a6f99723b593c01d66db26b8d
-
SHA1
b3101df9e1c686d2c92814106c414eef586e7589
-
SHA256
d88640b60a99a39f22a11731d0fc886fd2c9fdfb094f42886e6ba419025e69ec
-
SHA512
14b2000de6f0956a0f8e34c3de97e67725805fb6b64347f3a118a6709854636bc4e3c4ecb91238971b4b6ea556ca0969daf9c7b9b62bda559462277cb11889e6
-
SSDEEP
24576:w06qmrWqPh8mEa3H1WG+34OJ0CFpD0Yn+511xRZ8q2XoHWwb:8rWI8jYH1m4OJ0gpD0Y+rY
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e1acbd5a6f99723b593c01d66db26b8d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e1acbd5a6f99723b593c01d66db26b8d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
raccoon
b76017a227a0d879dec7c76613918569d03892fb
-
url4cnc
http://telegka.top/brikitiki
http://telegin.top/brikitiki
https://t.me/brikitiki
Extracted
azorult
http://195.245.112.115/index.php
Extracted
oski
scarsa.ac.ug
Targets
-
-
Target
JaffaCakes118_e1acbd5a6f99723b593c01d66db26b8d
-
Size
1.1MB
-
MD5
e1acbd5a6f99723b593c01d66db26b8d
-
SHA1
b3101df9e1c686d2c92814106c414eef586e7589
-
SHA256
d88640b60a99a39f22a11731d0fc886fd2c9fdfb094f42886e6ba419025e69ec
-
SHA512
14b2000de6f0956a0f8e34c3de97e67725805fb6b64347f3a118a6709854636bc4e3c4ecb91238971b4b6ea556ca0969daf9c7b9b62bda559462277cb11889e6
-
SSDEEP
24576:w06qmrWqPh8mEa3H1WG+34OJ0CFpD0Yn+511xRZ8q2XoHWwb:8rWI8jYH1m4OJ0gpD0Y+rY
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Oski family
-
Raccoon Stealer V1 payload
-
Raccoon family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-