General
-
Target
JaffaCakes118_0478e88a8c8a1f2138dd8918578e6ffa
-
Size
365KB
-
Sample
250219-kramgsyqt6
-
MD5
0478e88a8c8a1f2138dd8918578e6ffa
-
SHA1
81341ccf17038c3fec934ff6e8ce794716f16668
-
SHA256
f8c4f1e11abf74f17cad0a3d90aad26066d2ec3852651c9049f2217a4cea83ea
-
SHA512
36927feac470f0c491492c0944ecb6f282953613dacc9ce93bb1a838a87a2e1d0d7f8cf7b705b99c958ab5fea12c5d7a87f5588eb2965d6b0fda787d284cd04e
-
SSDEEP
6144:HV1iPtoCSnriBR0dS2n6625qxe9ZlBDjRAZwoACU0Ce5t+R3IIhIIW252s:HbiPtoCSyIS2nSJ9jR9L1IIhII/
Behavioral task
behavioral1
Sample
JaffaCakes118_0478e88a8c8a1f2138dd8918578e6ffa.exe
Resource
win7-20241023-en
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-CAWVQ2Y
-
gencode
mcfrv%wqhAQ#
-
install
false
-
offline_keylogger
false
-
persistence
false
Targets
-
-
Target
JaffaCakes118_0478e88a8c8a1f2138dd8918578e6ffa
-
Size
365KB
-
MD5
0478e88a8c8a1f2138dd8918578e6ffa
-
SHA1
81341ccf17038c3fec934ff6e8ce794716f16668
-
SHA256
f8c4f1e11abf74f17cad0a3d90aad26066d2ec3852651c9049f2217a4cea83ea
-
SHA512
36927feac470f0c491492c0944ecb6f282953613dacc9ce93bb1a838a87a2e1d0d7f8cf7b705b99c958ab5fea12c5d7a87f5588eb2965d6b0fda787d284cd04e
-
SSDEEP
6144:HV1iPtoCSnriBR0dS2n6625qxe9ZlBDjRAZwoACU0Ce5t+R3IIhIIW252s:HbiPtoCSyIS2nSJ9jR9L1IIhII/
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-