General
-
Target
JaffaCakes118_79f8b79a169ec09377aaf7807f94450b
-
Size
740KB
-
Sample
250202-hbz64a1qfn
-
MD5
79f8b79a169ec09377aaf7807f94450b
-
SHA1
bca6bf94c2a9ca4ef4a6534785253737a054a4a6
-
SHA256
381236b97176c57ebe2ccb344d338de57b2a8c4c2b12359ed0125f215c57dfef
-
SHA512
f85c003da49260b240008d905ebf399d2e74cac5b5cc86811275d57806f754225091b3d35e870fa65dcf037de221757d170cbc34964fa6cf95556a88931258e2
-
SSDEEP
3072:wgUaeTr+J9rGKjcn0bZCQBnfDnYt11Gt+QmCNuR6PztHVb0LoarUto68vWZNXDGL:VUHyLEXqGDJzNy
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_79f8b79a169ec09377aaf7807f94450b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_79f8b79a169ec09377aaf7807f94450b.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
latentbot
symantechantivirus.zapto.org
1symantechantivirus.zapto.org
2symantechantivirus.zapto.org
3symantechantivirus.zapto.org
4symantechantivirus.zapto.org
5symantechantivirus.zapto.org
6symantechantivirus.zapto.org
7symantechantivirus.zapto.org
8symantechantivirus.zapto.org
Targets
-
-
Target
JaffaCakes118_79f8b79a169ec09377aaf7807f94450b
-
Size
740KB
-
MD5
79f8b79a169ec09377aaf7807f94450b
-
SHA1
bca6bf94c2a9ca4ef4a6534785253737a054a4a6
-
SHA256
381236b97176c57ebe2ccb344d338de57b2a8c4c2b12359ed0125f215c57dfef
-
SHA512
f85c003da49260b240008d905ebf399d2e74cac5b5cc86811275d57806f754225091b3d35e870fa65dcf037de221757d170cbc34964fa6cf95556a88931258e2
-
SSDEEP
3072:wgUaeTr+J9rGKjcn0bZCQBnfDnYt11Gt+QmCNuR6PztHVb0LoarUto68vWZNXDGL:VUHyLEXqGDJzNy
-
Blackshades family
-
Blackshades payload
-
Latentbot family
-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1