General
-
Target
JaffaCakes118_131ed0b98ee2c1933efdad3de1b51aeb
-
Size
600KB
-
Sample
250123-de5hrsymet
-
MD5
131ed0b98ee2c1933efdad3de1b51aeb
-
SHA1
fcd38692f17e9435ed45ff833fb36d153edb7cc8
-
SHA256
4f8d7a281594177b09abe8d9fdb7eab00c6d19466313486323222c6b22007e25
-
SHA512
2dcaa624f8734e1c9c5061937c926196d04d39ed636a71c09ab80768cff28e0440e678f0e904dd876d484683410acd5da7cdb808fd689eebfda08c331fc335bc
-
SSDEEP
6144:rd5VDNwVBSS7Id4w5wLIoKhPBLXYpE4WfUnEkx6k1C14b2y:LVTScd48wUhhXYupu6k1CO
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_131ed0b98ee2c1933efdad3de1b51aeb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_131ed0b98ee2c1933efdad3de1b51aeb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
latentbot
1xxxdarkxxx.zapto.org
2xxxdarkxxx.zapto.org
3xxxdarkxxx.zapto.org
4xxxdarkxxx.zapto.org
5xxxdarkxxx.zapto.org
6xxxdarkxxx.zapto.org
7xxxdarkxxx.zapto.org
8xxxdarkxxx.zapto.org
Targets
-
-
Target
JaffaCakes118_131ed0b98ee2c1933efdad3de1b51aeb
-
Size
600KB
-
MD5
131ed0b98ee2c1933efdad3de1b51aeb
-
SHA1
fcd38692f17e9435ed45ff833fb36d153edb7cc8
-
SHA256
4f8d7a281594177b09abe8d9fdb7eab00c6d19466313486323222c6b22007e25
-
SHA512
2dcaa624f8734e1c9c5061937c926196d04d39ed636a71c09ab80768cff28e0440e678f0e904dd876d484683410acd5da7cdb808fd689eebfda08c331fc335bc
-
SSDEEP
6144:rd5VDNwVBSS7Id4w5wLIoKhPBLXYpE4WfUnEkx6k1C14b2y:LVTScd48wUhhXYupu6k1CO
-
Blackshades family
-
Blackshades payload
-
Latentbot family
-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1