General
-
Target
JaffaCakes118_4e52c36795a81d5c72120f16066cec6c
-
Size
848KB
-
Sample
250128-xs1lhs1qak
-
MD5
4e52c36795a81d5c72120f16066cec6c
-
SHA1
98e65163c38f6214a0040d3fcb21145ea5a42bdd
-
SHA256
0d62c84bae9162559e4c03254464420fe2f77d5f63b6470e387ab8f094915f40
-
SHA512
381f7ad01ea6688433897a379ec45ffe7cde8b5521c9b7b83d5bdd282879ef92530786acaaeaf87dbb4181b298fc3f694777dec1e7e7f50195ec019a3155cae2
-
SSDEEP
3072:o9yjAwU4Bls41euKdO5o9sJ99LoFLVZVh6/xw4gzIFrhRgiC6C7Z19z1CN4RQmBE:o9p1HozZt6RmsE3qQM5LlMCuxkQH0qh
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4e52c36795a81d5c72120f16066cec6c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4e52c36795a81d5c72120f16066cec6c.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
latentbot
symantechantivirus.zapto.org
1symantechantivirus.zapto.org
2symantechantivirus.zapto.org
3symantechantivirus.zapto.org
4symantechantivirus.zapto.org
5symantechantivirus.zapto.org
6symantechantivirus.zapto.org
7symantechantivirus.zapto.org
8symantechantivirus.zapto.org
Targets
-
-
Target
JaffaCakes118_4e52c36795a81d5c72120f16066cec6c
-
Size
848KB
-
MD5
4e52c36795a81d5c72120f16066cec6c
-
SHA1
98e65163c38f6214a0040d3fcb21145ea5a42bdd
-
SHA256
0d62c84bae9162559e4c03254464420fe2f77d5f63b6470e387ab8f094915f40
-
SHA512
381f7ad01ea6688433897a379ec45ffe7cde8b5521c9b7b83d5bdd282879ef92530786acaaeaf87dbb4181b298fc3f694777dec1e7e7f50195ec019a3155cae2
-
SSDEEP
3072:o9yjAwU4Bls41euKdO5o9sJ99LoFLVZVh6/xw4gzIFrhRgiC6C7Z19z1CN4RQmBE:o9p1HozZt6RmsE3qQM5LlMCuxkQH0qh
-
Blackshades family
-
Blackshades payload
-
Latentbot family
-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1