General
-
Target
JaffaCakes118_33ecc627f63b589e7ff67c248d1ec3cf
-
Size
749KB
-
Sample
250228-xrl2qstzft
-
MD5
33ecc627f63b589e7ff67c248d1ec3cf
-
SHA1
8a2a93ff1553cf2450c9eca7842d8b118b5554a5
-
SHA256
453976d3f2a82bb38764809e037bd2cb845a3e190d0de31d7c145fc9d6fc5246
-
SHA512
5636ac89275f9faa37c25aea1fd0216e493a637e9635361e4575429ee06875441b44b6f8f236d427577f22fa24d3caef8ec4f9499bc1adf27e049869156f6632
-
SSDEEP
12288:5wnH/+HdB63tW/xWp2yS2Y+WiB2R4phHNWVXwGnT9E4ysep+YVtVFQ/f3Fz:iHKdcW5H2Y+WiB2RCWtxT9EnsfYVtTQH
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_33ecc627f63b589e7ff67c248d1ec3cf.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Guest16
freakyland.no-ip.biz:84
DC_MUTEX-F54S21D
-
gencode
$z2GzzGzm=iD
-
install
false
-
offline_keylogger
false
-
persistence
false
Targets
-
-
Target
JaffaCakes118_33ecc627f63b589e7ff67c248d1ec3cf
-
Size
749KB
-
MD5
33ecc627f63b589e7ff67c248d1ec3cf
-
SHA1
8a2a93ff1553cf2450c9eca7842d8b118b5554a5
-
SHA256
453976d3f2a82bb38764809e037bd2cb845a3e190d0de31d7c145fc9d6fc5246
-
SHA512
5636ac89275f9faa37c25aea1fd0216e493a637e9635361e4575429ee06875441b44b6f8f236d427577f22fa24d3caef8ec4f9499bc1adf27e049869156f6632
-
SSDEEP
12288:5wnH/+HdB63tW/xWp2yS2Y+WiB2R4phHNWVXwGnT9E4ysep+YVtVFQ/f3Fz:iHKdcW5H2Y+WiB2RCWtxT9EnsfYVtTQH
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-