General
-
Target
JaffaCakes118_28a55957354bdb37eaa7dff333d74ef2
-
Size
156KB
-
Sample
250226-z5vxxatsh1
-
MD5
28a55957354bdb37eaa7dff333d74ef2
-
SHA1
b0919f10770d453c4c6b2c5bb0a8f232a698abe7
-
SHA256
03c819aefb5839a29d3e7cc7d6873e6567a6f6fc5838d9ecc0148888a9a25c5e
-
SHA512
4e23d901916e5f580a78194a3eb76b02a16c9df9cb46b62af6a99adc85dce80d4c4ebc15f9f4a93b33166922d09507c8514c985cea96a2d71b7b5bc60bd6f79e
-
SSDEEP
3072:golhK8sqT6MM6MMMMMMMMM2kxYJ+ipeq1u4oTsZlgghZ+SlnopAqcKzkAwLNe54/:gondu4ogr7+KopAqc68HvsK
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_28a55957354bdb37eaa7dff333d74ef2.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_28a55957354bdb37eaa7dff333d74ef2.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
JaffaCakes118_28a55957354bdb37eaa7dff333d74ef2
-
Size
156KB
-
MD5
28a55957354bdb37eaa7dff333d74ef2
-
SHA1
b0919f10770d453c4c6b2c5bb0a8f232a698abe7
-
SHA256
03c819aefb5839a29d3e7cc7d6873e6567a6f6fc5838d9ecc0148888a9a25c5e
-
SHA512
4e23d901916e5f580a78194a3eb76b02a16c9df9cb46b62af6a99adc85dce80d4c4ebc15f9f4a93b33166922d09507c8514c985cea96a2d71b7b5bc60bd6f79e
-
SSDEEP
3072:golhK8sqT6MM6MMMMMMMMM2kxYJ+ipeq1u4oTsZlgghZ+SlnopAqcKzkAwLNe54/:gondu4ogr7+KopAqc68HvsK
Score10/10-
Andromeda family
-
Detects Andromeda payload.
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-